General

  • Target

    6617e9a8363999e8395893f828eb8ad6

  • Size

    10.8MB

  • Sample

    240118-1g5ymsaeg9

  • MD5

    6617e9a8363999e8395893f828eb8ad6

  • SHA1

    e8b84e24166d6eafa499bbbaabb08a042acc1e6f

  • SHA256

    9a7d1c75db1c6a45407cfee700b515f8866a5d36012915ca4b028c826d3fd1eb

  • SHA512

    ffe17a0c95dac47a10b560a88c6474bd1146d0638b1e43da1e46b36b47cda56103207992169505cb510f8419722062418560f0e01ca93f8e69e5a72dd3a0e89a

  • SSDEEP

    196608:6vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      6617e9a8363999e8395893f828eb8ad6

    • Size

      10.8MB

    • MD5

      6617e9a8363999e8395893f828eb8ad6

    • SHA1

      e8b84e24166d6eafa499bbbaabb08a042acc1e6f

    • SHA256

      9a7d1c75db1c6a45407cfee700b515f8866a5d36012915ca4b028c826d3fd1eb

    • SHA512

      ffe17a0c95dac47a10b560a88c6474bd1146d0638b1e43da1e46b36b47cda56103207992169505cb510f8419722062418560f0e01ca93f8e69e5a72dd3a0e89a

    • SSDEEP

      196608:6vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks