General

  • Target

    186c02563f5f1abad8dca9c356b12fc25f3b8f882117c3f8b11c8eafb82748cb

  • Size

    164KB

  • Sample

    220608-v1tf3ahdfq

  • MD5

    3a418eebc66c60605b3fd8ff3d0ae7fe

  • SHA1

    c783046040c8b68cbb7a7e515636bea2abcafa4b

  • SHA256

    186c02563f5f1abad8dca9c356b12fc25f3b8f882117c3f8b11c8eafb82748cb

  • SHA512

    d83601897c97e81a0e23644ebcf089e31b8f0103122591e334301b867b58f9e46abfcf4d9d65716d5d1655a75a91a39aa919f0e4ff96c73761674ab72fee0543

Malware Config

Extracted

Family

tofsee

C2

103.232.222.57

111.121.193.242

123.249.0.22

Targets

    • Target

      186c02563f5f1abad8dca9c356b12fc25f3b8f882117c3f8b11c8eafb82748cb

    • Size

      164KB

    • MD5

      3a418eebc66c60605b3fd8ff3d0ae7fe

    • SHA1

      c783046040c8b68cbb7a7e515636bea2abcafa4b

    • SHA256

      186c02563f5f1abad8dca9c356b12fc25f3b8f882117c3f8b11c8eafb82748cb

    • SHA512

      d83601897c97e81a0e23644ebcf089e31b8f0103122591e334301b867b58f9e46abfcf4d9d65716d5d1655a75a91a39aa919f0e4ff96c73761674ab72fee0543

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks