General

  • Target

    abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44

  • Size

    152KB

  • Sample

    231106-l4z9caca45

  • MD5

    fa093abb8610d3dca89596ccba4ef31e

  • SHA1

    5dc9acec8aeeeb568957e8b48eb2b75cc77848e2

  • SHA256

    4994865f0a463637fdba17e004e2fe306f044d2155b827199523b37112e1e8bb

  • SHA512

    b784faa99b01b85aaf3588587156162a21f9ba586e41b73715ac627fd59879f870c54fa3b706b9bff507cb4b26e1edad2ca7e4f6e19796b0c32f4657e7b61db7

  • SSDEEP

    3072:aLqWudUVk9bOxTQm8Jo1+1kRPAvz64IeF+LQket1rCtJbysH3o:KIdUVobOx6l1kAB9FcP616bysH3o

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44

    • Size

      256KB

    • MD5

      fef3091059af5ae452cd4554a7fb2f31

    • SHA1

      6716795202f0eb637e61b5c2e12561e4587b322d

    • SHA256

      abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44

    • SHA512

      f895a12bf19419bdc0392b215d135acf2acd0479ca632b807529a68c52cfb60603bb9a462c380d2c15031819e87db6ce13cc987ac385891dabc31760401e6a6b

    • SSDEEP

      3072:yr992I1yxYhjZjXLR1EalWmPEDUvz64IeF+GA52A26Q3GLeJig/oGOUZ:TI1yK1LRuaQmP2+B9FXRGKJ1o

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks