General

  • Target

    2025-04-24_aed2e5ab9c508eb0cdfc94b93007d8af_amadey_elex_karagany_rhadamanthys_smoke-loader_stealc

  • Size

    14.6MB

  • Sample

    250424-t82lzasjx3

  • MD5

    aed2e5ab9c508eb0cdfc94b93007d8af

  • SHA1

    c3bb639b83db3d7a7494c5770559e3434b2a45ef

  • SHA256

    38c1d1525b5ab502fe8955fa32d5b2d1c45d40c7261ea866b6bf57b8087c500b

  • SHA512

    2982c3bb3dcf69952beb2c4b6ad351b87613e1c3d9e48394c2533df99000e3ffa93a26eefed711649eae3ff8fa6952b60b4a79d07750ba20fc2395067c8309a2

  • SSDEEP

    3072:0dh4rj43qHj/zjgRYR6lVatBLufQxMmYq7sxkgaBCh:G4rj46/zjgRI2atBLTMYQiga

Malware Config

Extracted

Family

tofsee

C2

niflheimr.cn

jotunheim.name

Targets

    • Target

      2025-04-24_aed2e5ab9c508eb0cdfc94b93007d8af_amadey_elex_karagany_rhadamanthys_smoke-loader_stealc

    • Size

      14.6MB

    • MD5

      aed2e5ab9c508eb0cdfc94b93007d8af

    • SHA1

      c3bb639b83db3d7a7494c5770559e3434b2a45ef

    • SHA256

      38c1d1525b5ab502fe8955fa32d5b2d1c45d40c7261ea866b6bf57b8087c500b

    • SHA512

      2982c3bb3dcf69952beb2c4b6ad351b87613e1c3d9e48394c2533df99000e3ffa93a26eefed711649eae3ff8fa6952b60b4a79d07750ba20fc2395067c8309a2

    • SSDEEP

      3072:0dh4rj43qHj/zjgRYR6lVatBLufQxMmYq7sxkgaBCh:G4rj46/zjgRI2atBLTMYQiga

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks