General

  • Target

    2a1390eb5563d733832c473f1109e872.bin

  • Size

    161KB

  • Sample

    231107-bxenysbb35

  • MD5

    4ded7ca0ddb880836a1789487a138174

  • SHA1

    b31fecaed6ecfcf49adb3e087e4227d795e3cc4d

  • SHA256

    d25573cde3ac622d4931c3abc6c57e2a4ee150c485ddfdb74b6d57c180423fc0

  • SHA512

    1d0ea21ee69cf053e31dbb36ee15609539b84e73b51b3f4e06c3dbb55842b2d8a11779ef7390c4c97e66726e6b0fe68f07b9f93ce898f7b703d4397ab2f366bb

  • SSDEEP

    3072:Frb6MvrXH4dAEKxaeQyuyh1AcTj62DFBAYyAXOoJwB537kOwuI/rIStp:V6yTaAEkaeTu21AqjrFBAvAe8tuIDjj

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      d15e72bad1966732249eb9f860d6dcaad2db09541ad67de8eee39febc706aa31.exe

    • Size

      259KB

    • MD5

      2a1390eb5563d733832c473f1109e872

    • SHA1

      44429ef9a32e8ce931eeb541a3863ed6f9727ccb

    • SHA256

      d15e72bad1966732249eb9f860d6dcaad2db09541ad67de8eee39febc706aa31

    • SHA512

      5ac6fcbd42942d7656c651fab7432a0942570afc5068e96e6a7c41a0b504059605052eab306193f686199c1bf739a2af0982bf480b995e55b9e116abd6c8b4e2

    • SSDEEP

      3072:GVXQ37fLJYJqgU5AoFCE+MBVaXAlXxDAVh5lRIxEnU:OQLfL2k7xCE+U6exDAfRq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks