General

  • Target

    file.exe

  • Size

    350KB

  • Sample

    221202-mxvkysdg7z

  • MD5

    64b84c266e164427f5ff999f0852817c

  • SHA1

    2ac627bc23ec6669c2d8a95f6c3f35c6e1e753a9

  • SHA256

    ef514682a7ab092326100883aa5a4101cb49a2054f538e3731d80c19e065f016

  • SHA512

    f1e36be5e459c71eef8c3880d3cb905bf7f4f909fe00bafb255b45e89b1657cbb3cb6596ffe91751fe690dd7d1923ad8884a4198813ce4a0253ea4025c9ff69b

  • SSDEEP

    6144:Y825LbuPCD71fzEEtPBYNd2LNDRyjkuRjMgU:Y7nuKRlRKd2RDA1RQg

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      350KB

    • MD5

      64b84c266e164427f5ff999f0852817c

    • SHA1

      2ac627bc23ec6669c2d8a95f6c3f35c6e1e753a9

    • SHA256

      ef514682a7ab092326100883aa5a4101cb49a2054f538e3731d80c19e065f016

    • SHA512

      f1e36be5e459c71eef8c3880d3cb905bf7f4f909fe00bafb255b45e89b1657cbb3cb6596ffe91751fe690dd7d1923ad8884a4198813ce4a0253ea4025c9ff69b

    • SSDEEP

      6144:Y825LbuPCD71fzEEtPBYNd2LNDRyjkuRjMgU:Y7nuKRlRKd2RDA1RQg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks