General

  • Target

    2025-04-04_8a6abae8b7101356c33cd26cf52f53d3_rhadamanthys_smoke-loader

  • Size

    13.7MB

  • Sample

    250404-ckp5lax1as

  • MD5

    8a6abae8b7101356c33cd26cf52f53d3

  • SHA1

    04d3310363519c5ff0b46459a2e4ab947ea409b1

  • SHA256

    f5b0ca5061b16cf25f6def7144b20ba6ab3cff9bdc18ab847c6371ee6d115b55

  • SHA512

    b161b8275a33e2fca851e13d0e2aa93b31523d71c0d57ede87337bab04a682ef638a9132a748b87a1b2d389e1ac6f848962dbf59f204c26faaa70aecdb827176

  • SSDEEP

    6144:gOFZnjC+veRxHUa6E8PcGQ1GNTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTj:pfnjH6m99ZaG

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-04_8a6abae8b7101356c33cd26cf52f53d3_rhadamanthys_smoke-loader

    • Size

      13.7MB

    • MD5

      8a6abae8b7101356c33cd26cf52f53d3

    • SHA1

      04d3310363519c5ff0b46459a2e4ab947ea409b1

    • SHA256

      f5b0ca5061b16cf25f6def7144b20ba6ab3cff9bdc18ab847c6371ee6d115b55

    • SHA512

      b161b8275a33e2fca851e13d0e2aa93b31523d71c0d57ede87337bab04a682ef638a9132a748b87a1b2d389e1ac6f848962dbf59f204c26faaa70aecdb827176

    • SSDEEP

      6144:gOFZnjC+veRxHUa6E8PcGQ1GNTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTj:pfnjH6m99ZaG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks