General

  • Target

    8f9bb3a7266ab5b9b69efdccfc4b08caf510f30e7a01a1d28f071d8c51fae2d8

  • Size

    147KB

  • Sample

    221126-lg4y1sbc7x

  • MD5

    4d83d22a9fc1239d934e267867d666d9

  • SHA1

    c4a6f3a568f4c9a07db50ca8abc44efad63bccb2

  • SHA256

    8f9bb3a7266ab5b9b69efdccfc4b08caf510f30e7a01a1d28f071d8c51fae2d8

  • SHA512

    7d847890dffa9c581f875caed61c89e744fc72cb27c2d387ef15af6d8e4d08d6cad3182facc9b00c7c5a37202c22d542d474c43c424fa8d662496d0f75c6100c

  • SSDEEP

    3072:sKw5vmdLlF5bH/moJM0lVvg/dsopnRLjkYAfA+kbRpg:kmd1ffJ7ldEWot2fOp

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      8f9bb3a7266ab5b9b69efdccfc4b08caf510f30e7a01a1d28f071d8c51fae2d8

    • Size

      147KB

    • MD5

      4d83d22a9fc1239d934e267867d666d9

    • SHA1

      c4a6f3a568f4c9a07db50ca8abc44efad63bccb2

    • SHA256

      8f9bb3a7266ab5b9b69efdccfc4b08caf510f30e7a01a1d28f071d8c51fae2d8

    • SHA512

      7d847890dffa9c581f875caed61c89e744fc72cb27c2d387ef15af6d8e4d08d6cad3182facc9b00c7c5a37202c22d542d474c43c424fa8d662496d0f75c6100c

    • SSDEEP

      3072:sKw5vmdLlF5bH/moJM0lVvg/dsopnRLjkYAfA+kbRpg:kmd1ffJ7ldEWot2fOp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks