General

  • Target

    2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676

  • Size

    152KB

  • Sample

    220612-f1c2rafhfl

  • MD5

    8c49fb45ab38659a7e1c22685a2578c9

  • SHA1

    9c2e7120232d29d7bb75797d8256dafb8bb424b1

  • SHA256

    2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676

  • SHA512

    4189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc

Malware Config

Extracted

Family

tofsee

C2

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676

    • Size

      152KB

    • MD5

      8c49fb45ab38659a7e1c22685a2578c9

    • SHA1

      9c2e7120232d29d7bb75797d8256dafb8bb424b1

    • SHA256

      2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676

    • SHA512

      4189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks