General

  • Target

    2025-04-24_869bc1453632f67fe740bac3e39d92df_amadey_elex_rhadamanthys_smoke-loader

  • Size

    13.9MB

  • Sample

    250424-vczyyasls8

  • MD5

    869bc1453632f67fe740bac3e39d92df

  • SHA1

    0d5125175a0a9f57113a2f35d81e449ffbe13827

  • SHA256

    8bcd9a03e2dac7d5a6d54a003df37ed9313298c3f7ad6f005e8912e771d0a404

  • SHA512

    abc302881e8f72f2d3f4d83e502240400dacd23480b943daeade9ee4e9f1ff78ed4eddc591f463024aa1d017e42fa479f7b5df8890c5f7b68e7782c32040a8bd

  • SSDEEP

    12288:Gef9tiUIxYjvVzL10J7nnXVJAj1666666666666666666666666666666666666H:GeriUGiP0J7n

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2025-04-24_869bc1453632f67fe740bac3e39d92df_amadey_elex_rhadamanthys_smoke-loader

    • Size

      13.9MB

    • MD5

      869bc1453632f67fe740bac3e39d92df

    • SHA1

      0d5125175a0a9f57113a2f35d81e449ffbe13827

    • SHA256

      8bcd9a03e2dac7d5a6d54a003df37ed9313298c3f7ad6f005e8912e771d0a404

    • SHA512

      abc302881e8f72f2d3f4d83e502240400dacd23480b943daeade9ee4e9f1ff78ed4eddc591f463024aa1d017e42fa479f7b5df8890c5f7b68e7782c32040a8bd

    • SSDEEP

      12288:Gef9tiUIxYjvVzL10J7nnXVJAj1666666666666666666666666666666666666H:GeriUGiP0J7n

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks