General

  • Target

    4a9cf6d94bdbb5cc8a9aa649d881aa3f

  • Size

    14.7MB

  • Sample

    231226-b99d4aege3

  • MD5

    4a9cf6d94bdbb5cc8a9aa649d881aa3f

  • SHA1

    2264dfff92e60df1c88de176cb727b02cab2ead4

  • SHA256

    d700078220b88dcc6ca5f6d644bda00b0f1c068375733f0cc861610b9de9ea00

  • SHA512

    461591c323b9ac923654e4e05181efa85e13e53bdabf9355a7ad5fca91bb7d38a1c3e50d15006e043b39345760db77f1902c1ba21c14db867b7e1a587ea32be9

  • SSDEEP

    393216:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr

Malware Config

Extracted

Family

tofsee

C2

194.61.3.129

defeatwax.ru

Targets

    • Target

      4a9cf6d94bdbb5cc8a9aa649d881aa3f

    • Size

      14.7MB

    • MD5

      4a9cf6d94bdbb5cc8a9aa649d881aa3f

    • SHA1

      2264dfff92e60df1c88de176cb727b02cab2ead4

    • SHA256

      d700078220b88dcc6ca5f6d644bda00b0f1c068375733f0cc861610b9de9ea00

    • SHA512

      461591c323b9ac923654e4e05181efa85e13e53bdabf9355a7ad5fca91bb7d38a1c3e50d15006e043b39345760db77f1902c1ba21c14db867b7e1a587ea32be9

    • SSDEEP

      393216:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks