General

  • Target

    3531d74feb734ed745fe0d74b0e001cb.exe

  • Size

    14.0MB

  • Sample

    240102-tat48sbgf5

  • MD5

    3531d74feb734ed745fe0d74b0e001cb

  • SHA1

    a141e88e7c0d0f0489f70019024527890c3bafe5

  • SHA256

    1a7c5306972bfb8122f58fb4fa665599d59133bdc10fb21ccf7ec70cbced1dcc

  • SHA512

    d4449d76483ba4fb22822f30e2b6bfe3566f7013b2ad91f935c5b6ffacc251a71dda5af62036355774e7d99cb9fe8ca2d57b33dd3d268335e0e1e19510938048

  • SSDEEP

    24576:RUqa71YB5DHlommmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm:RF15

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      3531d74feb734ed745fe0d74b0e001cb.exe

    • Size

      14.0MB

    • MD5

      3531d74feb734ed745fe0d74b0e001cb

    • SHA1

      a141e88e7c0d0f0489f70019024527890c3bafe5

    • SHA256

      1a7c5306972bfb8122f58fb4fa665599d59133bdc10fb21ccf7ec70cbced1dcc

    • SHA512

      d4449d76483ba4fb22822f30e2b6bfe3566f7013b2ad91f935c5b6ffacc251a71dda5af62036355774e7d99cb9fe8ca2d57b33dd3d268335e0e1e19510938048

    • SSDEEP

      24576:RUqa71YB5DHlommmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm:RF15

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks