General

  • Target

    12942113a6462b87cf3bfc52161dc9f8

  • Size

    14.6MB

  • Sample

    231230-jnvb2sfgh7

  • MD5

    12942113a6462b87cf3bfc52161dc9f8

  • SHA1

    a17a7eedeb13de9055b8a8ea2b3a2aa3d676a4b6

  • SHA256

    34228f82027ebdc82c56ab79ef9be354c2d0f8931a3947a6e57ad0561d1b1ec8

  • SHA512

    fb39b0584c50c3f56e2f41f720928aaec9a8fd8ed2adb3e27d2cd42ec69dc3c887a0c0abcfdc457c42b768062a4327054e0acd9be8b6a2f89b36765d7bc417fe

  • SSDEEP

    6144:MHCbMTTkphQW/uoIuOB9u9dwEImeaDdYft:RbMnkpKW8uko9Cm2f

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      12942113a6462b87cf3bfc52161dc9f8

    • Size

      14.6MB

    • MD5

      12942113a6462b87cf3bfc52161dc9f8

    • SHA1

      a17a7eedeb13de9055b8a8ea2b3a2aa3d676a4b6

    • SHA256

      34228f82027ebdc82c56ab79ef9be354c2d0f8931a3947a6e57ad0561d1b1ec8

    • SHA512

      fb39b0584c50c3f56e2f41f720928aaec9a8fd8ed2adb3e27d2cd42ec69dc3c887a0c0abcfdc457c42b768062a4327054e0acd9be8b6a2f89b36765d7bc417fe

    • SSDEEP

      6144:MHCbMTTkphQW/uoIuOB9u9dwEImeaDdYft:RbMnkpKW8uko9Cm2f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks