General

  • Target

    file

  • Size

    200KB

  • Sample

    231120-tsc9faha94

  • MD5

    a6753915f302040aa26cb9f13aade7e2

  • SHA1

    e67acba1fadf57c36649585d075806bdca9f72bf

  • SHA256

    a4ebe271dbb5873a96f50cdfa6d864069cd532801541e0942784342bed3e253b

  • SHA512

    4045cd8c4040c8c43e3faf16e34603ff976903a87d75cc59b2c7b331d3db592d2c528fdb6f6439d4c04e7752786647b842e5b250a077f2c9dd9a115d3ed65645

  • SSDEEP

    3072:obp7HXRSAY9iwOG5ghGGGzoGdfS+3PYTQuNZXvFv9bJ/wFj:IBSN9i/GVndffkQuNX9bJ

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file

    • Size

      200KB

    • MD5

      a6753915f302040aa26cb9f13aade7e2

    • SHA1

      e67acba1fadf57c36649585d075806bdca9f72bf

    • SHA256

      a4ebe271dbb5873a96f50cdfa6d864069cd532801541e0942784342bed3e253b

    • SHA512

      4045cd8c4040c8c43e3faf16e34603ff976903a87d75cc59b2c7b331d3db592d2c528fdb6f6439d4c04e7752786647b842e5b250a077f2c9dd9a115d3ed65645

    • SSDEEP

      3072:obp7HXRSAY9iwOG5ghGGGzoGdfS+3PYTQuNZXvFv9bJ/wFj:IBSN9i/GVndffkQuNX9bJ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks