General

  • Target

    86e38e8f83aebdfe028de5700ab97d03

  • Size

    13.0MB

  • Sample

    240201-1bngeaeea2

  • MD5

    86e38e8f83aebdfe028de5700ab97d03

  • SHA1

    04b0cc2126a46179b4a632095993d262d3c59c2e

  • SHA256

    acf90c644ebc942d0a2a943c0c0d9092d4186226644a7b8f436bb3e5620c1b32

  • SHA512

    25b395bc1adeb98094f882b2da6c3c429b39c86228798b6c43cfd4871fa2f4f124562202acb553fef7ee0d029d2d92ea33ae8f55ec183172e851842d3620c15d

  • SSDEEP

    12288:/2dfAUz3nf50000000000000000000000000000000000000000000000000000k:/4oU

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      86e38e8f83aebdfe028de5700ab97d03

    • Size

      13.0MB

    • MD5

      86e38e8f83aebdfe028de5700ab97d03

    • SHA1

      04b0cc2126a46179b4a632095993d262d3c59c2e

    • SHA256

      acf90c644ebc942d0a2a943c0c0d9092d4186226644a7b8f436bb3e5620c1b32

    • SHA512

      25b395bc1adeb98094f882b2da6c3c429b39c86228798b6c43cfd4871fa2f4f124562202acb553fef7ee0d029d2d92ea33ae8f55ec183172e851842d3620c15d

    • SSDEEP

      12288:/2dfAUz3nf50000000000000000000000000000000000000000000000000000k:/4oU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks