General

  • Target

    a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9

  • Size

    135KB

  • Sample

    221201-y27xmabe71

  • MD5

    57098bd9d968e47a4380e4610f34e4ad

  • SHA1

    98888c4be4a6153ed2ebbbd1a146cf910756b2e9

  • SHA256

    a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9

  • SHA512

    3faab93be088e8dc3d8c142c0396e69f59fd9b3e51776e507322d666191b2f1706fdda9e4af8920e7b031f95bb3ce463039f70302949ed71d492e3d273442be4

  • SSDEEP

    3072:TFuAXp3T0O1+kbhDIsEuq+iLJrsJ4T6jNZIuJQk8vusHZGc:MAXBT0Abe4DiFrs9jrAkUus5

Malware Config

Extracted

Family

tofsee

C2

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9

    • Size

      135KB

    • MD5

      57098bd9d968e47a4380e4610f34e4ad

    • SHA1

      98888c4be4a6153ed2ebbbd1a146cf910756b2e9

    • SHA256

      a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9

    • SHA512

      3faab93be088e8dc3d8c142c0396e69f59fd9b3e51776e507322d666191b2f1706fdda9e4af8920e7b031f95bb3ce463039f70302949ed71d492e3d273442be4

    • SSDEEP

      3072:TFuAXp3T0O1+kbhDIsEuq+iLJrsJ4T6jNZIuJQk8vusHZGc:MAXBT0Abe4DiFrs9jrAkUus5

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks