General

  • Target

    2025-04-24_7716996acafb0b4b9abedeb10a8f3bac_amadey_elex_rhadamanthys_smoke-loader

  • Size

    15.0MB

  • Sample

    250424-tfcr5swwfx

  • MD5

    7716996acafb0b4b9abedeb10a8f3bac

  • SHA1

    b63b2592abea9f27a3f34f1be06e5be8e49843f9

  • SHA256

    6df18c921dc4c7e08876bb88b93a3d700223015a56359ea74ac4d4e143094b45

  • SHA512

    a9b9fab19ca5e3c61aa76180afc243e9615685fbf06bc07142fc561f1d1475b8b699bd0c9c6c38c17746b43b2bf4eb5f198e3867ce831581696ef49e25908fff

  • SSDEEP

    24576:1N3cxFN3RaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRm:1NA3v

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      2025-04-24_7716996acafb0b4b9abedeb10a8f3bac_amadey_elex_rhadamanthys_smoke-loader

    • Size

      15.0MB

    • MD5

      7716996acafb0b4b9abedeb10a8f3bac

    • SHA1

      b63b2592abea9f27a3f34f1be06e5be8e49843f9

    • SHA256

      6df18c921dc4c7e08876bb88b93a3d700223015a56359ea74ac4d4e143094b45

    • SHA512

      a9b9fab19ca5e3c61aa76180afc243e9615685fbf06bc07142fc561f1d1475b8b699bd0c9c6c38c17746b43b2bf4eb5f198e3867ce831581696ef49e25908fff

    • SSDEEP

      24576:1N3cxFN3RaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRaRm:1NA3v

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks