General

  • Target

    160e30c71e462426594e1eafdd8f3738

  • Size

    12.0MB

  • Sample

    231230-ml7q5saddq

  • MD5

    160e30c71e462426594e1eafdd8f3738

  • SHA1

    181ce37ed2c04b5ee6f2f758d9cbbfb74d43c5c5

  • SHA256

    60748aeaefe1bc7202d63673346844f97d7b04093646f5560ddd0bd0de8bde3b

  • SHA512

    a6c7246f3e8bef15b75c77e47c10e46a7d89bb4714ec7671db2f019f36e67b22afa18318758ee589e79829e74c904b2454145ec4567569f16f3ecb488ab03388

  • SSDEEP

    12288:Il5qOcvT9o+egMU+HoWfprc0sssssssssssssssssssssssssssssssssssssssf:UcvT9ofeqrc

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      160e30c71e462426594e1eafdd8f3738

    • Size

      12.0MB

    • MD5

      160e30c71e462426594e1eafdd8f3738

    • SHA1

      181ce37ed2c04b5ee6f2f758d9cbbfb74d43c5c5

    • SHA256

      60748aeaefe1bc7202d63673346844f97d7b04093646f5560ddd0bd0de8bde3b

    • SHA512

      a6c7246f3e8bef15b75c77e47c10e46a7d89bb4714ec7671db2f019f36e67b22afa18318758ee589e79829e74c904b2454145ec4567569f16f3ecb488ab03388

    • SSDEEP

      12288:Il5qOcvT9o+egMU+HoWfprc0sssssssssssssssssssssssssssssssssssssssf:UcvT9ofeqrc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks