General

  • Target

    file

  • Size

    292KB

  • Sample

    230506-n5pkcabc7z

  • MD5

    4e39579f1251ae570e145e352e7393f7

  • SHA1

    07497b310187f77e2c18364c7a0e31068be822d1

  • SHA256

    53c6ebd75518ed05b22ab762b476f48313b700283358dccb7d55b02f29cfe462

  • SHA512

    29dd728463e77e3988a074a97b36ebba3f0876e684ea96746b3ec0aeaf78e4ee25182b34a51900b6400fd8a22ea9a911bb15ae195bd04419f8303b9412920009

  • SSDEEP

    3072:Xk6e+HiNFjbrieXWP72/BRczZpgAhtBE3k2Bxz+4a2GMW/ft/Dr05xK:7zkjbrFi78BkpgKC3z2YK

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file

    • Size

      292KB

    • MD5

      4e39579f1251ae570e145e352e7393f7

    • SHA1

      07497b310187f77e2c18364c7a0e31068be822d1

    • SHA256

      53c6ebd75518ed05b22ab762b476f48313b700283358dccb7d55b02f29cfe462

    • SHA512

      29dd728463e77e3988a074a97b36ebba3f0876e684ea96746b3ec0aeaf78e4ee25182b34a51900b6400fd8a22ea9a911bb15ae195bd04419f8303b9412920009

    • SSDEEP

      3072:Xk6e+HiNFjbrieXWP72/BRczZpgAhtBE3k2Bxz+4a2GMW/ft/Dr05xK:7zkjbrFi78BkpgKC3z2YK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks