General

  • Target

    b2c822b5eaef23f2e2f3c41dbe792df502c9818f85e595450b4934fffae98213

  • Size

    180KB

  • Sample

    221202-v6jttahd72

  • MD5

    9ad02f7a000557841df40137de302ad7

  • SHA1

    73a57c739a63126bf519690cbb6e5524d6cb1f47

  • SHA256

    b2c822b5eaef23f2e2f3c41dbe792df502c9818f85e595450b4934fffae98213

  • SHA512

    510b581436db23623f228ee0a2b2ed8cb28f6fc8cbedf11243d60a3eb31ff7909dce0c3ae93ef0f913d4023807e3ff5d377b324b2c78f261997003012a91369b

  • SSDEEP

    3072:1l4v+FlO+cPtrcfC3czXwlZqJwmHDquZfFrvQKvu5aLMN4yN6sZqJwmHDquZf+:1lkXztwYiwlZqJwmHDquZfFrvQKvu5aE

Malware Config

Extracted

Family

tofsee

C2

89.149.236.147

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      b2c822b5eaef23f2e2f3c41dbe792df502c9818f85e595450b4934fffae98213

    • Size

      180KB

    • MD5

      9ad02f7a000557841df40137de302ad7

    • SHA1

      73a57c739a63126bf519690cbb6e5524d6cb1f47

    • SHA256

      b2c822b5eaef23f2e2f3c41dbe792df502c9818f85e595450b4934fffae98213

    • SHA512

      510b581436db23623f228ee0a2b2ed8cb28f6fc8cbedf11243d60a3eb31ff7909dce0c3ae93ef0f913d4023807e3ff5d377b324b2c78f261997003012a91369b

    • SSDEEP

      3072:1l4v+FlO+cPtrcfC3czXwlZqJwmHDquZfFrvQKvu5aLMN4yN6sZqJwmHDquZf+:1lkXztwYiwlZqJwmHDquZfFrvQKvu5aE

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks