General

  • Target

    2025-04-04_81cf393b6f480b6f1f00e45732ca7ff9_rhadamanthys_smoke-loader

  • Size

    14.2MB

  • Sample

    250404-hqsqka11cx

  • MD5

    81cf393b6f480b6f1f00e45732ca7ff9

  • SHA1

    694f9ca1d900052e7d8d208ffac9ac80acc7d059

  • SHA256

    d32943d823d5b663c04d38b3a0ac781b99a71891e36f7c2ca53b898f1b48356f

  • SHA512

    17cda04215e6a454634d38c60e79017948e5d9650fe7f3ebc8121ab3d5058b7c09b6f57b850e2c6ddd7583b62505c443d37a9e6af60551c996b44f3e849992b1

  • SSDEEP

    49152:vSni2SzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWz9:ANO

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-04_81cf393b6f480b6f1f00e45732ca7ff9_rhadamanthys_smoke-loader

    • Size

      14.2MB

    • MD5

      81cf393b6f480b6f1f00e45732ca7ff9

    • SHA1

      694f9ca1d900052e7d8d208ffac9ac80acc7d059

    • SHA256

      d32943d823d5b663c04d38b3a0ac781b99a71891e36f7c2ca53b898f1b48356f

    • SHA512

      17cda04215e6a454634d38c60e79017948e5d9650fe7f3ebc8121ab3d5058b7c09b6f57b850e2c6ddd7583b62505c443d37a9e6af60551c996b44f3e849992b1

    • SSDEEP

      49152:vSni2SzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWz9:ANO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks