General

  • Target

    2025-04-24_11f072def1a640e004eff4b53af9c4c9_amadey_elex_rhadamanthys_smoke-loader

  • Size

    12.0MB

  • Sample

    250424-tp63cawzbx

  • MD5

    11f072def1a640e004eff4b53af9c4c9

  • SHA1

    8fe096b7cf834440c6c007fa2ea36dacce0d38f3

  • SHA256

    33118ddfa552d01b7b45b4ed7c9086c2d870d246690452a2f34c53baa485f9ce

  • SHA512

    07344e8ae4f0cd94d5db38f88641ae074c7cbea597491f853ecf7b6bea530e1aaf9537add86836379a476760c3bc447bc87d5e527af2dced220479a74290c839

  • SSDEEP

    6144:1Nd2deLfUnKwg1PcAuYz+DisxTDwbtjpZH4rWlRjO1n:172sjUnKw0sHDiW2arW9u

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      2025-04-24_11f072def1a640e004eff4b53af9c4c9_amadey_elex_rhadamanthys_smoke-loader

    • Size

      12.0MB

    • MD5

      11f072def1a640e004eff4b53af9c4c9

    • SHA1

      8fe096b7cf834440c6c007fa2ea36dacce0d38f3

    • SHA256

      33118ddfa552d01b7b45b4ed7c9086c2d870d246690452a2f34c53baa485f9ce

    • SHA512

      07344e8ae4f0cd94d5db38f88641ae074c7cbea597491f853ecf7b6bea530e1aaf9537add86836379a476760c3bc447bc87d5e527af2dced220479a74290c839

    • SSDEEP

      6144:1Nd2deLfUnKwg1PcAuYz+DisxTDwbtjpZH4rWlRjO1n:172sjUnKw0sHDiW2arW9u

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks