General

  • Target

    f76c8b1971b45aaed739c73c5d76fc5de20e236da84f6cbe531a6391445ccfe9

  • Size

    256KB

  • Sample

    221130-xpkqwsfd94

  • MD5

    f6417df538fef21cf0bbf54153843bb8

  • SHA1

    8399d35bc40be456d7093d8d631a96734fbae062

  • SHA256

    f76c8b1971b45aaed739c73c5d76fc5de20e236da84f6cbe531a6391445ccfe9

  • SHA512

    e9382b543ca84d26eebb644e6e8761392bc807faa933215585d4d258930482533bd4940a706ef01f17d0ca87517f21bdf101e704dba1101a1bc8f9b62b6cee04

  • SSDEEP

    6144:bxpkdMYZ/cfvWpUdCi0AYX/m16gyn/oT:1nYpWWeci7z16VoT

Malware Config

Extracted

Family

tofsee

C2

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      f76c8b1971b45aaed739c73c5d76fc5de20e236da84f6cbe531a6391445ccfe9

    • Size

      256KB

    • MD5

      f6417df538fef21cf0bbf54153843bb8

    • SHA1

      8399d35bc40be456d7093d8d631a96734fbae062

    • SHA256

      f76c8b1971b45aaed739c73c5d76fc5de20e236da84f6cbe531a6391445ccfe9

    • SHA512

      e9382b543ca84d26eebb644e6e8761392bc807faa933215585d4d258930482533bd4940a706ef01f17d0ca87517f21bdf101e704dba1101a1bc8f9b62b6cee04

    • SSDEEP

      6144:bxpkdMYZ/cfvWpUdCi0AYX/m16gyn/oT:1nYpWWeci7z16VoT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks