General

  • Target

    592d40863ff1e617388d42e0886b1a3280602fc6e25217d74436d232a32041c1_JC.exe

  • Size

    217KB

  • Sample

    231010-v6qx5afa51

  • MD5

    d463534b0954694b60167a0cb04efaeb

  • SHA1

    a87d785486046ae80d796207f917e8f56d13a4b5

  • SHA256

    592d40863ff1e617388d42e0886b1a3280602fc6e25217d74436d232a32041c1

  • SHA512

    564b84a451b449c6499cbe8de41dacaf3f5bf9e949d4fde52d1b12d03f19b74bda0bf33502a6a8e6e2451c4fbdd97e7bc52d5b0f096e002310e8b6785944f755

  • SSDEEP

    3072:oHXkUCqSTZLMGAfp3C1rlodZNE6nZ1Vb96fQd0Dha5mT9:qkUCDLyfJoGdZ26Z1V5JKhNT

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      592d40863ff1e617388d42e0886b1a3280602fc6e25217d74436d232a32041c1_JC.exe

    • Size

      217KB

    • MD5

      d463534b0954694b60167a0cb04efaeb

    • SHA1

      a87d785486046ae80d796207f917e8f56d13a4b5

    • SHA256

      592d40863ff1e617388d42e0886b1a3280602fc6e25217d74436d232a32041c1

    • SHA512

      564b84a451b449c6499cbe8de41dacaf3f5bf9e949d4fde52d1b12d03f19b74bda0bf33502a6a8e6e2451c4fbdd97e7bc52d5b0f096e002310e8b6785944f755

    • SSDEEP

      3072:oHXkUCqSTZLMGAfp3C1rlodZNE6nZ1Vb96fQd0Dha5mT9:qkUCDLyfJoGdZ26Z1V5JKhNT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks