General

  • Target

    2025-04-24_d5cc29c86fcefdef6fb6d6fae2979e03_amadey_elex_rhadamanthys_smoke-loader

  • Size

    10.2MB

  • Sample

    250424-tnmbjs1lx9

  • MD5

    d5cc29c86fcefdef6fb6d6fae2979e03

  • SHA1

    d52e18941dd39a287687a58888bd13cac04f5f71

  • SHA256

    b7d7134c2b076a85f64191d6a5fa96f03fa44429b50e7a65984347bc1191f4ff

  • SHA512

    5f428367b1c0998256588685be16b43daf2db3fb9862b39de4a4d9eeefe95e0dd3f890171e59bb6b08f8b37de150e862690b098822525c541947b7bb728311bf

  • SSDEEP

    12288:2ef9tiUIxYjvVzL10J7nnXVJAj16666666666666666666666666666666666664:2eriUGiP0J7nV

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-24_d5cc29c86fcefdef6fb6d6fae2979e03_amadey_elex_rhadamanthys_smoke-loader

    • Size

      10.2MB

    • MD5

      d5cc29c86fcefdef6fb6d6fae2979e03

    • SHA1

      d52e18941dd39a287687a58888bd13cac04f5f71

    • SHA256

      b7d7134c2b076a85f64191d6a5fa96f03fa44429b50e7a65984347bc1191f4ff

    • SHA512

      5f428367b1c0998256588685be16b43daf2db3fb9862b39de4a4d9eeefe95e0dd3f890171e59bb6b08f8b37de150e862690b098822525c541947b7bb728311bf

    • SSDEEP

      12288:2ef9tiUIxYjvVzL10J7nnXVJAj16666666666666666666666666666666666664:2eriUGiP0J7nV

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks