General

  • Target

    file

  • Size

    293KB

  • Sample

    230630-ksr8xshf3v

  • MD5

    32b58e1cd89fd340645b551025a38064

  • SHA1

    732171514e663155ef785ae35d674bb886d57769

  • SHA256

    55cb39bdef73e2a161aefbb44166470fa941adb08d3d276947d19593de3e238b

  • SHA512

    d11db7d843b8d3801faa6f5c519136f9d088e2fe537cb106ba2ad881ad7f1364f4328ca0947a535208b68e9df4d401000167a14b16a23de283508332d9e2a88f

  • SSDEEP

    3072:XiUe2VPCMDsJ9OgXL1H21Q4fDuJr5+Gk91h9lmKBR6+MTXJ:lezQsFLdMQ4CJrwn9l6+MTJ

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file

    • Size

      293KB

    • MD5

      32b58e1cd89fd340645b551025a38064

    • SHA1

      732171514e663155ef785ae35d674bb886d57769

    • SHA256

      55cb39bdef73e2a161aefbb44166470fa941adb08d3d276947d19593de3e238b

    • SHA512

      d11db7d843b8d3801faa6f5c519136f9d088e2fe537cb106ba2ad881ad7f1364f4328ca0947a535208b68e9df4d401000167a14b16a23de283508332d9e2a88f

    • SSDEEP

      3072:XiUe2VPCMDsJ9OgXL1H21Q4fDuJr5+Gk91h9lmKBR6+MTXJ:lezQsFLdMQ4CJrwn9l6+MTJ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks