General

  • Target

    09f646eca6cf8443ce6fd1af985bc53e

  • Size

    12.8MB

  • Sample

    231219-mph7ysdhdk

  • MD5

    09f646eca6cf8443ce6fd1af985bc53e

  • SHA1

    3e179cfd3c4344f3d8e4642a5cb2e71cfcf536e1

  • SHA256

    e260edd16a6525f611e8a30f5a8c0e5abd63871cad27f8366f79529d627800b0

  • SHA512

    180501519579f94a8e8139d23bf25c349867793b98418b889cf2d056d55f4c1e067747ab720fae060346a03b24ec905abaad2c04385717fa84397fd54a365411

  • SSDEEP

    49152:8UkssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssH:8

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      09f646eca6cf8443ce6fd1af985bc53e

    • Size

      12.8MB

    • MD5

      09f646eca6cf8443ce6fd1af985bc53e

    • SHA1

      3e179cfd3c4344f3d8e4642a5cb2e71cfcf536e1

    • SHA256

      e260edd16a6525f611e8a30f5a8c0e5abd63871cad27f8366f79529d627800b0

    • SHA512

      180501519579f94a8e8139d23bf25c349867793b98418b889cf2d056d55f4c1e067747ab720fae060346a03b24ec905abaad2c04385717fa84397fd54a365411

    • SSDEEP

      49152:8UkssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssH:8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks