General

  • Target

    file

  • Size

    244KB

  • Sample

    231001-vxn26sdf76

  • MD5

    027fd7f7551f40b72a612f94da41d973

  • SHA1

    2ea4f739bcef8c60408fa47bd641053ae855b236

  • SHA256

    9119602dc4b71bdd06f4152572f2a903c003482a90aa53fedfe36d786c318a4b

  • SHA512

    f45138da44de13e76bddd11ca5779a377c5ae43bc7917380c3b8e8f3af6b896578241eb8d9b460453678eebb926ed822fab247fd52fb1b05c3430d308d6b48d3

  • SSDEEP

    3072:xtXrSmy3Cfw2n8vzb3MEdH+6YCFGOXXB5mpVdm3Hg52B4QwJrYTq:7jNvn83BpFBApSrVwYTq

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file

    • Size

      244KB

    • MD5

      027fd7f7551f40b72a612f94da41d973

    • SHA1

      2ea4f739bcef8c60408fa47bd641053ae855b236

    • SHA256

      9119602dc4b71bdd06f4152572f2a903c003482a90aa53fedfe36d786c318a4b

    • SHA512

      f45138da44de13e76bddd11ca5779a377c5ae43bc7917380c3b8e8f3af6b896578241eb8d9b460453678eebb926ed822fab247fd52fb1b05c3430d308d6b48d3

    • SSDEEP

      3072:xtXrSmy3Cfw2n8vzb3MEdH+6YCFGOXXB5mpVdm3Hg52B4QwJrYTq:7jNvn83BpFBApSrVwYTq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks