General

  • Target

    file.exe

  • Size

    168KB

  • Sample

    221125-2es2qsee7v

  • MD5

    e743ca012be36824efeb6050c6730f28

  • SHA1

    8abab698bf7f6a9540708789cfd1eaa3ad4b734b

  • SHA256

    f7e303071ac33e96d6fed2c4c97bd09acea5fdb91f2624766f89944b7ef57e91

  • SHA512

    3c186a8e2e1fa1c836517bdad14f5d8d3019c87cde94f03681394c19b82c14587e448f36ce38f7f6a2439641a61098920dac01a76957cc0f8b8bd8659203c306

  • SSDEEP

    3072:WiWlRGF5u5tHzS5+6gdcxuvCl+iXE4NJ5SniXVSSg:SUfytH+Qv6JLXa

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      168KB

    • MD5

      e743ca012be36824efeb6050c6730f28

    • SHA1

      8abab698bf7f6a9540708789cfd1eaa3ad4b734b

    • SHA256

      f7e303071ac33e96d6fed2c4c97bd09acea5fdb91f2624766f89944b7ef57e91

    • SHA512

      3c186a8e2e1fa1c836517bdad14f5d8d3019c87cde94f03681394c19b82c14587e448f36ce38f7f6a2439641a61098920dac01a76957cc0f8b8bd8659203c306

    • SSDEEP

      3072:WiWlRGF5u5tHzS5+6gdcxuvCl+iXE4NJ5SniXVSSg:SUfytH+Qv6JLXa

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks