General

  • Target

    file.exe

  • Size

    294KB

  • Sample

    230513-jr41nafg72

  • MD5

    49c95ae2a4f0069f5ef8cb7c70860531

  • SHA1

    1fc8490eb5d14a148a263e744bd791b1f01e6f6a

  • SHA256

    72d074460e5807725c7d6f0ca1f923dbd069b93f86f718f3cb91c9140dd08007

  • SHA512

    28be09331d4bf0191a8bb909fdb17a99bafc193e4433ebd6ff1614ba4ecdb3d3ed8ab0840bcae2b59aee04aea41b6ef9bd12b62332b308417b755c2aaaad5c66

  • SSDEEP

    3072:/pXlqtP8WsLZPdb/3dLhA2AquW0eAb14h+8hsFd825sCwKV1IN:1lkPHsLZPV/3aquSA5U6dUCa

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      294KB

    • MD5

      49c95ae2a4f0069f5ef8cb7c70860531

    • SHA1

      1fc8490eb5d14a148a263e744bd791b1f01e6f6a

    • SHA256

      72d074460e5807725c7d6f0ca1f923dbd069b93f86f718f3cb91c9140dd08007

    • SHA512

      28be09331d4bf0191a8bb909fdb17a99bafc193e4433ebd6ff1614ba4ecdb3d3ed8ab0840bcae2b59aee04aea41b6ef9bd12b62332b308417b755c2aaaad5c66

    • SSDEEP

      3072:/pXlqtP8WsLZPdb/3dLhA2AquW0eAb14h+8hsFd825sCwKV1IN:1lkPHsLZPV/3aquSA5U6dUCa

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks