General

  • Target

    NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe

  • Size

    179KB

  • Sample

    231023-vbamnace58

  • MD5

    2722b0312c2e8cb299647d97225c17e6

  • SHA1

    0961bbbb6a87e68c97db29e57a878c0204029bcd

  • SHA256

    358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911

  • SHA512

    6f84a11c8d2441168f9ece41e5b7acf226a7e5b8cf2b6b7865a9055bf6e934a09c2fd90b662421f4d7f48bdcf9653e2dd8ce60afcbbd0a318273f9bf3af75dfb

  • SSDEEP

    3072:Z1yBN6fur6AIscrbx+MkJa9ripeH7ewpNnrvIl6QuwNMPGROY0eQX:Zw7+AIprbwMFrbewnjC6Q0PqN

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe

    • Size

      179KB

    • MD5

      2722b0312c2e8cb299647d97225c17e6

    • SHA1

      0961bbbb6a87e68c97db29e57a878c0204029bcd

    • SHA256

      358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911

    • SHA512

      6f84a11c8d2441168f9ece41e5b7acf226a7e5b8cf2b6b7865a9055bf6e934a09c2fd90b662421f4d7f48bdcf9653e2dd8ce60afcbbd0a318273f9bf3af75dfb

    • SSDEEP

      3072:Z1yBN6fur6AIscrbx+MkJa9ripeH7ewpNnrvIl6QuwNMPGROY0eQX:Zw7+AIprbwMFrbewnjC6Q0PqN

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks