General

  • Target

    d50cc359381325522385b32fb37aa695.bin

  • Size

    138KB

  • Sample

    231011-mccveagd3t

  • MD5

    3bad44d2670e762a31d0b88f3e91c045

  • SHA1

    7e7af3e86337fd74ff9ebc291205da85a021f21b

  • SHA256

    5a2ea5ad3caedc397b32499780db43b6868997cde2c644fabdb464de7ea09e86

  • SHA512

    980d472b29a96b1cc254b19a77b46493246ea6bdead69f2be6b4c214947ea4aa53c7603423c67e7a1c4c3a0f6eeb2064e81b91485a470e2960d44322159af669

  • SSDEEP

    3072:qONSvzrSAfKzdwG23U60NW9yF8dpOGSRCS63kN0r+soYUn9xNRqe:qO4zu5FiUdW9yF8dpR93kN9sbWDqe

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c.exe

    • Size

      283KB

    • MD5

      d50cc359381325522385b32fb37aa695

    • SHA1

      f63ee5b87cea7e2385b7800c0f5728960546de70

    • SHA256

      bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c

    • SHA512

      2c106b342402668158e9e55495929ffb99ee00cf1063f3dcb538880aa967b70a123a5603dfb92d82d71842eb4b7e2cc4bc268e49c97473a8924c91b474cce220

    • SSDEEP

      3072:1aHQFccmfkw9dCj/fkjFYmGX6jAAVfcezSepGt1U1wdwSDr9:YHQFDms8dCb8jSmSWVfcez5AdwK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks