General

  • Target

    22cbedd671eef5dad95001ae0ad11add173cfb11959dddff4f545f481d870e01

  • Size

    160KB

  • Sample

    220612-ek6tfsdefk

  • MD5

    151e547c0bcd4f597ae577fc6f5c0905

  • SHA1

    dadbc8ce69a363ef93b54cd8512d7b75dd96c13c

  • SHA256

    22cbedd671eef5dad95001ae0ad11add173cfb11959dddff4f545f481d870e01

  • SHA512

    7b0d95a968f2d41a89fe1ba61305921910211263829faffb211cd95825489439c5c9fd19508dd0f788e993ce6a5caa5abd711301fcac7cfacbc0b4170ace4afb

Malware Config

Extracted

Family

tofsee

C2

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      22cbedd671eef5dad95001ae0ad11add173cfb11959dddff4f545f481d870e01

    • Size

      160KB

    • MD5

      151e547c0bcd4f597ae577fc6f5c0905

    • SHA1

      dadbc8ce69a363ef93b54cd8512d7b75dd96c13c

    • SHA256

      22cbedd671eef5dad95001ae0ad11add173cfb11959dddff4f545f481d870e01

    • SHA512

      7b0d95a968f2d41a89fe1ba61305921910211263829faffb211cd95825489439c5c9fd19508dd0f788e993ce6a5caa5abd711301fcac7cfacbc0b4170ace4afb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks