General

  • Target

    7f4ac2fafc02d4f6144c8aeee6627ec8

  • Size

    13.6MB

  • Sample

    240129-jqepdaefgm

  • MD5

    7f4ac2fafc02d4f6144c8aeee6627ec8

  • SHA1

    9b97a23034cd97993b6c55d5a4ac16d4e8ac8e3b

  • SHA256

    84c7cf500a3f80503733ee11075b15399a1d6af01485e19c3caaecb52c2909c8

  • SHA512

    ca74d14d415f20c44a0f26975c95f0ef8618ae2cf57dd4db039e8483bae70d83074d67d1c04cbdccffdc0f6c54f998de88de6da77814b5a8bbb537b60ca17466

  • SSDEEP

    24576:1htJbmFQuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:SF

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      7f4ac2fafc02d4f6144c8aeee6627ec8

    • Size

      13.6MB

    • MD5

      7f4ac2fafc02d4f6144c8aeee6627ec8

    • SHA1

      9b97a23034cd97993b6c55d5a4ac16d4e8ac8e3b

    • SHA256

      84c7cf500a3f80503733ee11075b15399a1d6af01485e19c3caaecb52c2909c8

    • SHA512

      ca74d14d415f20c44a0f26975c95f0ef8618ae2cf57dd4db039e8483bae70d83074d67d1c04cbdccffdc0f6c54f998de88de6da77814b5a8bbb537b60ca17466

    • SSDEEP

      24576:1htJbmFQuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:SF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks