General

  • Target

    2025-04-24_72d6205fe4c3c5d59a0fe759de8cf2de_amadey_elex_redline-stealer_rhadamanthys_smoke-loader_stealc

  • Size

    12.4MB

  • Sample

    250424-te14cazrx8

  • MD5

    72d6205fe4c3c5d59a0fe759de8cf2de

  • SHA1

    ab92e3b03546b752c2dd1989e0798e68ae75697b

  • SHA256

    d362bcae23f85ba9cf23ad064e952e92a4f6cb1321bf7d47fba00b613cb87d9b

  • SHA512

    ab9cbc51f0ea256d278be5ee4f53291cf5f0f6ce9d69d4677404efa7528eaea12c3a90407acce6f473ef8b52743ef31e6143ff4ec0f66cf1c8da6d71b11ff6d7

  • SSDEEP

    6144:qOFZnjC+veRxHUa6E8PcGQ1GNTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTr:LfnjH6m99ZaG5

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-24_72d6205fe4c3c5d59a0fe759de8cf2de_amadey_elex_redline-stealer_rhadamanthys_smoke-loader_stealc

    • Size

      12.4MB

    • MD5

      72d6205fe4c3c5d59a0fe759de8cf2de

    • SHA1

      ab92e3b03546b752c2dd1989e0798e68ae75697b

    • SHA256

      d362bcae23f85ba9cf23ad064e952e92a4f6cb1321bf7d47fba00b613cb87d9b

    • SHA512

      ab9cbc51f0ea256d278be5ee4f53291cf5f0f6ce9d69d4677404efa7528eaea12c3a90407acce6f473ef8b52743ef31e6143ff4ec0f66cf1c8da6d71b11ff6d7

    • SSDEEP

      6144:qOFZnjC+veRxHUa6E8PcGQ1GNTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTr:LfnjH6m99ZaG5

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks