General

  • Target

    f784390bef1610437897b0044be3a495e58de9cef5de77d9f45f5b3a5defe5fe

  • Size

    221KB

  • Sample

    231106-fr9pcshc31

  • MD5

    2488d90434caafc7d576e6e16220a772

  • SHA1

    9f72377d8cc4e561ae6172460df94b8d0f87ed9e

  • SHA256

    f784390bef1610437897b0044be3a495e58de9cef5de77d9f45f5b3a5defe5fe

  • SHA512

    5ee948f1eeb8ba21cda44d781b616f96957b6f7a1951b0a4dfe6c7c881ae28d243722cf751209efa8e1e274fe392b0956ea1423ec6ed1efb7880b87e44aa5e18

  • SSDEEP

    3072:WHMfCYL/+qeVAeW5XNFJarDAJ98I2a9CZo2Y07LPd0RPGnllVP:WsfbLQIF00JWla92o2Y0foGnR

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      f784390bef1610437897b0044be3a495e58de9cef5de77d9f45f5b3a5defe5fe

    • Size

      221KB

    • MD5

      2488d90434caafc7d576e6e16220a772

    • SHA1

      9f72377d8cc4e561ae6172460df94b8d0f87ed9e

    • SHA256

      f784390bef1610437897b0044be3a495e58de9cef5de77d9f45f5b3a5defe5fe

    • SHA512

      5ee948f1eeb8ba21cda44d781b616f96957b6f7a1951b0a4dfe6c7c881ae28d243722cf751209efa8e1e274fe392b0956ea1423ec6ed1efb7880b87e44aa5e18

    • SSDEEP

      3072:WHMfCYL/+qeVAeW5XNFJarDAJ98I2a9CZo2Y07LPd0RPGnllVP:WsfbLQIF00JWla92o2Y0foGnR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks