General

  • Target

    file.exe

  • Size

    276KB

  • Sample

    221202-g1hgxaah77

  • MD5

    68d3b1e67263b0d65c81e9738924c21d

  • SHA1

    29ef6a67c445c7ba49c4206bfac2da03a9d8ac1b

  • SHA256

    1fb5e05e383ce3b2950d93894f802b730a867f688d6af5d80f404956117d3e89

  • SHA512

    1acdb17454cf8333b8d92d2263ba58f5fd079dd37a35df3b19ae51b6891fd9b23421fdf4a0347862d37dcf49343e7603486fb7509c6764f7bf5a5235935b7746

  • SSDEEP

    3072:siRc48qyPDiLo4YXMtq5qsDm6JPWXylDBKJ+0h5h0jKPcWJME9hIh3eGjMgG1aoK:KFbiLxYXMnkXAXG4XQK0WJuRjMgU

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      276KB

    • MD5

      68d3b1e67263b0d65c81e9738924c21d

    • SHA1

      29ef6a67c445c7ba49c4206bfac2da03a9d8ac1b

    • SHA256

      1fb5e05e383ce3b2950d93894f802b730a867f688d6af5d80f404956117d3e89

    • SHA512

      1acdb17454cf8333b8d92d2263ba58f5fd079dd37a35df3b19ae51b6891fd9b23421fdf4a0347862d37dcf49343e7603486fb7509c6764f7bf5a5235935b7746

    • SSDEEP

      3072:siRc48qyPDiLo4YXMtq5qsDm6JPWXylDBKJ+0h5h0jKPcWJME9hIh3eGjMgG1aoK:KFbiLxYXMnkXAXG4XQK0WJuRjMgU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks