General

  • Target

    file.exe

  • Size

    202KB

  • Sample

    231005-f25hdsgg9w

  • MD5

    0e912c89df4a4fce65d70506d0e7f233

  • SHA1

    e437ddd952485dab4dde33373c8dfc1d2cc8370d

  • SHA256

    45b199d7f3571172242647277be284df1a6fd3c4a01b084ec02bd9f661a8daf3

  • SHA512

    9063e2f1b35887ffeeeea778ac5881895ce50baa41635082b451dcbf40e81826e68f773649f36437a032769c81f80cf255f1fe6f8dd915aed2937ffa62978191

  • SSDEEP

    3072:/RqPDovM85s6O/z0U6Xz8nTNKYwPV4spZRvolZgw5HX/Vr:KDXIjkoU64R8dTRQlFPV

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      202KB

    • MD5

      0e912c89df4a4fce65d70506d0e7f233

    • SHA1

      e437ddd952485dab4dde33373c8dfc1d2cc8370d

    • SHA256

      45b199d7f3571172242647277be284df1a6fd3c4a01b084ec02bd9f661a8daf3

    • SHA512

      9063e2f1b35887ffeeeea778ac5881895ce50baa41635082b451dcbf40e81826e68f773649f36437a032769c81f80cf255f1fe6f8dd915aed2937ffa62978191

    • SSDEEP

      3072:/RqPDovM85s6O/z0U6Xz8nTNKYwPV4spZRvolZgw5HX/Vr:KDXIjkoU64R8dTRQlFPV

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks