General

  • Target

    063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48

  • Size

    124KB

  • Sample

    221202-etyt7sce72

  • MD5

    8c61b0f91e87a4276dadb68757d06ce6

  • SHA1

    b36cd20fa4094fe4fe341444740c64d647f7de7a

  • SHA256

    063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48

  • SHA512

    c4506d09d87f3944562129a5457cf92f98303bb877b7e3380fce4a2fc5d6bf3e754e60e54415d8d588df172f6b1f37e087b0a8fbc314d01a5bc28c92ab1b4807

  • SSDEEP

    1536:05qi9cmPC1eMK8echCEjQemGaNslku4ZAjj/4YAncWb+d:M9cHmchCYQ1Bsl146/4Yidb+d

Malware Config

Extracted

Family

tofsee

C2

103.9.150.244

188.190.120.102

121.127.250.203

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48

    • Size

      124KB

    • MD5

      8c61b0f91e87a4276dadb68757d06ce6

    • SHA1

      b36cd20fa4094fe4fe341444740c64d647f7de7a

    • SHA256

      063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48

    • SHA512

      c4506d09d87f3944562129a5457cf92f98303bb877b7e3380fce4a2fc5d6bf3e754e60e54415d8d588df172f6b1f37e087b0a8fbc314d01a5bc28c92ab1b4807

    • SSDEEP

      1536:05qi9cmPC1eMK8echCEjQemGaNslku4ZAjj/4YAncWb+d:M9cHmchCYQ1Bsl146/4Yidb+d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks