General

  • Target

    e86b987fdd4dd09bb9168653a750e7a8dc3d2f491b839496d8c6ec14c52df94a

  • Size

    130KB

  • Sample

    221130-sh684adg21

  • MD5

    f20c2e5c40d100b840e9df5cacdcfde4

  • SHA1

    661220e497bdb6dfcc52b48aa5d9f888db19595e

  • SHA256

    e86b987fdd4dd09bb9168653a750e7a8dc3d2f491b839496d8c6ec14c52df94a

  • SHA512

    9d3e57a14bcb876068cdb1b1c864b102c00ebe73a1d56bd5dc05078501506fc2fb67d77bdaba1a382862b01890f8bb2fcfa48a134bdb60bae7e448acef52c6c3

  • SSDEEP

    3072:GvNN0cMdYQ3QRi6yxZ2pHbvxWEXYff78ROm8Mxq:IN0ndYsQRXJWEXYcnj

Malware Config

Extracted

Family

tofsee

C2

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      e86b987fdd4dd09bb9168653a750e7a8dc3d2f491b839496d8c6ec14c52df94a

    • Size

      130KB

    • MD5

      f20c2e5c40d100b840e9df5cacdcfde4

    • SHA1

      661220e497bdb6dfcc52b48aa5d9f888db19595e

    • SHA256

      e86b987fdd4dd09bb9168653a750e7a8dc3d2f491b839496d8c6ec14c52df94a

    • SHA512

      9d3e57a14bcb876068cdb1b1c864b102c00ebe73a1d56bd5dc05078501506fc2fb67d77bdaba1a382862b01890f8bb2fcfa48a134bdb60bae7e448acef52c6c3

    • SSDEEP

      3072:GvNN0cMdYQ3QRi6yxZ2pHbvxWEXYff78ROm8Mxq:IN0ndYsQRXJWEXYcnj

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks