General

  • Target

    file.exe

  • Size

    349KB

  • Sample

    221202-ldmwbsgd6y

  • MD5

    a1799db268c1e09addebda326640d27a

  • SHA1

    2e7dd4871e0220a69c1913c974ddc5f43ee4fb25

  • SHA256

    6d1c55b32923f8a5c29fbfd3a1596bc9ef0a6f5376d8b923dcb334fc7ce97c07

  • SHA512

    6ead660126768007d2bb296656654867cd4a6642fccf9122415de573fc9a1644900c9b0b2342c6218ae24dae690e04868ab03ee197d5ba3aa18136eb0ae775f4

  • SSDEEP

    3072:ix4P18aXVLB9+mTtq5qWGcjKQ10S+LwgME9WKFL6OhtWItQTIhIh3eGjMgG1ao5w:lOEVLr+mTnWr2W0S+zWY9uRjMgU

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      349KB

    • MD5

      a1799db268c1e09addebda326640d27a

    • SHA1

      2e7dd4871e0220a69c1913c974ddc5f43ee4fb25

    • SHA256

      6d1c55b32923f8a5c29fbfd3a1596bc9ef0a6f5376d8b923dcb334fc7ce97c07

    • SHA512

      6ead660126768007d2bb296656654867cd4a6642fccf9122415de573fc9a1644900c9b0b2342c6218ae24dae690e04868ab03ee197d5ba3aa18136eb0ae775f4

    • SSDEEP

      3072:ix4P18aXVLB9+mTtq5qWGcjKQ10S+LwgME9WKFL6OhtWItQTIhIh3eGjMgG1ao5w:lOEVLr+mTnWr2W0S+zWY9uRjMgU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks