General

  • Target

    2025-04-24_ccd0c37eaaef93b4b9d1fe2cef6573e9_elex_rhadamanthys_smoke-loader_stealc

  • Size

    14.2MB

  • Sample

    250424-vbmbfsskw6

  • MD5

    ccd0c37eaaef93b4b9d1fe2cef6573e9

  • SHA1

    f85552398b9759b5d8b89984c00ef3aa864a1b07

  • SHA256

    d7e12201e6daddf62c3f49b2b0b5b052f6fc6eefcc9c608e521f83d9b6b19be8

  • SHA512

    105c5993ae945a76c46980dce37c377b6f2b73c78254191bff7751174b8a6cbec54fb572c731f7a322346cf63ecbed5b862c789de77c83955a89f2de04933253

  • SSDEEP

    49152:vSni2SzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzB:ANM

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-24_ccd0c37eaaef93b4b9d1fe2cef6573e9_elex_rhadamanthys_smoke-loader_stealc

    • Size

      14.2MB

    • MD5

      ccd0c37eaaef93b4b9d1fe2cef6573e9

    • SHA1

      f85552398b9759b5d8b89984c00ef3aa864a1b07

    • SHA256

      d7e12201e6daddf62c3f49b2b0b5b052f6fc6eefcc9c608e521f83d9b6b19be8

    • SHA512

      105c5993ae945a76c46980dce37c377b6f2b73c78254191bff7751174b8a6cbec54fb572c731f7a322346cf63ecbed5b862c789de77c83955a89f2de04933253

    • SSDEEP

      49152:vSni2SzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzB:ANM

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks