General

  • Target

    1b1626a46597a88406433be8e0fb1f63afd8e3e063b5dcc81921cff7d1438d9b_JC.exe

  • Size

    206KB

  • Sample

    231012-pjyrkaca73

  • MD5

    2b6cbe0fb754fce314e9eac2b8df2f7b

  • SHA1

    ef9e4133a3c059deb531008f132675237f7b84be

  • SHA256

    1b1626a46597a88406433be8e0fb1f63afd8e3e063b5dcc81921cff7d1438d9b

  • SHA512

    4afe2005a543aa343783a376651c9ae631b7c83be801eb200e63b34d020d7b716403d906ee861ccf4cd96b6d3e75d7b3d0e9ed9c5484378cb8240e84a0bab033

  • SSDEEP

    3072:FWlT4OKlLQXcjcZkAbzFeOmFvNsi+PRKlPNRQv3uxeCSF5W/MTt:4l4HlLOcjciAbUHNsO1N14CSu/MT

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      1b1626a46597a88406433be8e0fb1f63afd8e3e063b5dcc81921cff7d1438d9b_JC.exe

    • Size

      206KB

    • MD5

      2b6cbe0fb754fce314e9eac2b8df2f7b

    • SHA1

      ef9e4133a3c059deb531008f132675237f7b84be

    • SHA256

      1b1626a46597a88406433be8e0fb1f63afd8e3e063b5dcc81921cff7d1438d9b

    • SHA512

      4afe2005a543aa343783a376651c9ae631b7c83be801eb200e63b34d020d7b716403d906ee861ccf4cd96b6d3e75d7b3d0e9ed9c5484378cb8240e84a0bab033

    • SSDEEP

      3072:FWlT4OKlLQXcjcZkAbzFeOmFvNsi+PRKlPNRQv3uxeCSF5W/MTt:4l4HlLOcjciAbUHNsO1N14CSu/MT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks