General

  • Target

    file.exe

  • Size

    351KB

  • Sample

    230415-w66t1sfb54

  • MD5

    2eb8c0882b1ad0705cad453aa0b8b283

  • SHA1

    ebd2e309e0ba0df58de9ce24314191a6ba441272

  • SHA256

    26459555ede3d63618aea53dad29b000e26f9bb13304b4a446f9ee167f78a8fc

  • SHA512

    28361092add39da688172d7d25c4b00150af33ee0636031aa3023d7475c7649bbfa3ab0ea5298cef977497c66bc80a1d8f9418c690fdcf97c1df2c15578dc2ac

  • SSDEEP

    3072:fBW5Cc85YwVButS8rZuc7icDaCHcwIlzXJa1eGE6JMSrXGUNuIycfr/Y4XdDtwBx:ZWvxwTOicS1/DFSLZuIx/Y4tRAwe4

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      351KB

    • MD5

      2eb8c0882b1ad0705cad453aa0b8b283

    • SHA1

      ebd2e309e0ba0df58de9ce24314191a6ba441272

    • SHA256

      26459555ede3d63618aea53dad29b000e26f9bb13304b4a446f9ee167f78a8fc

    • SHA512

      28361092add39da688172d7d25c4b00150af33ee0636031aa3023d7475c7649bbfa3ab0ea5298cef977497c66bc80a1d8f9418c690fdcf97c1df2c15578dc2ac

    • SSDEEP

      3072:fBW5Cc85YwVButS8rZuc7icDaCHcwIlzXJa1eGE6JMSrXGUNuIycfr/Y4XdDtwBx:ZWvxwTOicS1/DFSLZuIx/Y4tRAwe4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks