General

  • Target

    41e8d0cd880e3fcfa4e916dc16e569ed

  • Size

    14.2MB

  • Sample

    240104-zwm6pscda3

  • MD5

    41e8d0cd880e3fcfa4e916dc16e569ed

  • SHA1

    4201e77562330c33d6eeaee47a28c920c9a0c8a7

  • SHA256

    c15e980992dd745dee1a63cbddea26a39eec4083cb32a7448cb7e77eff551446

  • SHA512

    62f11c495a5341ba1360929087a0f0f2307bfcdf5088192a6e80f6f184b1fb50b18605c5837b3b1268f8efb07a5f106bc5f31d5226a95e76d5a8feb4dd8e7f8f

  • SSDEEP

    24576:5ATa7/2ggggggggggggggggggggggggggggggggggggggggggggggggggggggggH:5A27

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

defeatwax.ru

Targets

    • Target

      41e8d0cd880e3fcfa4e916dc16e569ed

    • Size

      14.2MB

    • MD5

      41e8d0cd880e3fcfa4e916dc16e569ed

    • SHA1

      4201e77562330c33d6eeaee47a28c920c9a0c8a7

    • SHA256

      c15e980992dd745dee1a63cbddea26a39eec4083cb32a7448cb7e77eff551446

    • SHA512

      62f11c495a5341ba1360929087a0f0f2307bfcdf5088192a6e80f6f184b1fb50b18605c5837b3b1268f8efb07a5f106bc5f31d5226a95e76d5a8feb4dd8e7f8f

    • SSDEEP

      24576:5ATa7/2ggggggggggggggggggggggggggggggggggggggggggggggggggggggggH:5A27

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks