General

  • Target

    58a3cd69a912bfa0cbd89e1f31d30bec

  • Size

    14.4MB

  • Sample

    240113-l2378agbfm

  • MD5

    58a3cd69a912bfa0cbd89e1f31d30bec

  • SHA1

    43403257b415c6fc50eb42066a5c68edf631dd2b

  • SHA256

    b6bc75e451ad38154584356229783004933b68ab97ed81dacbbb6387168bc0fe

  • SHA512

    89247207f9e3d324540e702841f257500f535fd6aa2c9daa6fc7ebecd65c520b11cc5bf77375c93c7a00e5ea3280e8a7327c6f83ee896c4cfe2da64ad759669c

  • SSDEEP

    24576:0erU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbH:0sW

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      58a3cd69a912bfa0cbd89e1f31d30bec

    • Size

      14.4MB

    • MD5

      58a3cd69a912bfa0cbd89e1f31d30bec

    • SHA1

      43403257b415c6fc50eb42066a5c68edf631dd2b

    • SHA256

      b6bc75e451ad38154584356229783004933b68ab97ed81dacbbb6387168bc0fe

    • SHA512

      89247207f9e3d324540e702841f257500f535fd6aa2c9daa6fc7ebecd65c520b11cc5bf77375c93c7a00e5ea3280e8a7327c6f83ee896c4cfe2da64ad759669c

    • SSDEEP

      24576:0erU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbH:0sW

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks