General

  • Target

    e77e9bd28dfc320d36293519ee10631996af59ccb93bb220b15ea21eb925b812

  • Size

    128KB

  • Sample

    221203-dwmz2saf77

  • MD5

    18557ef30c2b6532c74712ca0c6b8d30

  • SHA1

    219d4c24f6c3d412704bb88e6ee53ccc81cda412

  • SHA256

    e77e9bd28dfc320d36293519ee10631996af59ccb93bb220b15ea21eb925b812

  • SHA512

    91cf614334250cbd1955f2577e8c9992854e2b5effc787d2b79e9afe1f69f48d83728320330d21c17b7249a5a50309cea2b13c7f441a4c9aa5a42429b0a83f7b

  • SSDEEP

    3072:EQ1m24hjpYg2C47wRHpv0rZS2jbxWGqt:EQQNbjJmwxAZSbGq

Malware Config

Extracted

Family

tofsee

C2

91.218.38.211

188.130.237.71

185.25.48.10

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      e77e9bd28dfc320d36293519ee10631996af59ccb93bb220b15ea21eb925b812

    • Size

      128KB

    • MD5

      18557ef30c2b6532c74712ca0c6b8d30

    • SHA1

      219d4c24f6c3d412704bb88e6ee53ccc81cda412

    • SHA256

      e77e9bd28dfc320d36293519ee10631996af59ccb93bb220b15ea21eb925b812

    • SHA512

      91cf614334250cbd1955f2577e8c9992854e2b5effc787d2b79e9afe1f69f48d83728320330d21c17b7249a5a50309cea2b13c7f441a4c9aa5a42429b0a83f7b

    • SSDEEP

      3072:EQ1m24hjpYg2C47wRHpv0rZS2jbxWGqt:EQQNbjJmwxAZSbGq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks