General

  • Target

    20dfdbd674efcbab44b32d6cc584ad68.bin

  • Size

    129KB

  • Sample

    231009-bg95xshb4y

  • MD5

    530feee697c7588a9b725b88a8e6f306

  • SHA1

    8285c4161e93e60f8d57e4e5391aa36fac8634b5

  • SHA256

    9064e071e72a8272e83c562c119698b6dc7a9a5cfa1eb708eb36930c58181755

  • SHA512

    8c046a96373c3fa218fcf4424d6d6331779af67ba8c826964e0164d546cd6a4296b54461adf8a14ee55511b276ad6ce366be9de62929007419cc2001fce889ca

  • SSDEEP

    3072:yYe4GRuIVZgyNn66kHaUDZY8ZwdSZZkCudetgjHBx5TE:yG4dYy9+aLk/pux+

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c.exe

    • Size

      287KB

    • MD5

      20dfdbd674efcbab44b32d6cc584ad68

    • SHA1

      b80282075938b6914c5961fa26cc93e7bdb47b75

    • SHA256

      ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c

    • SHA512

      7247b396ea3ef70bb57a4803d0aebd67fd673dfb8cbba0cbb4192370734b6a7e4579b98a2f4609d43c4f653e001e31008bb74e03d67f4e4e014dccc2c5a796bd

    • SSDEEP

      3072:TZ77mQLNtWbyeOtxcaiiDzSZq6oarZSb2rdbvLJAwdNo9yv7r3O4a:t7K0W+eOtSjA8SbsDLdWQzTO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks