General

  • Target

    a9d9bb6cc7e182958073cd1a65e73530

  • Size

    15.0MB

  • Sample

    240227-w3ldxagb43

  • MD5

    a9d9bb6cc7e182958073cd1a65e73530

  • SHA1

    8782e15e4ef851b36f6697604c2425f216cd3071

  • SHA256

    c3639689bd22abc6ad8605e9ed27aa0192f4790ab8de15520a69e7cf7f745fc7

  • SHA512

    cc49fe964c43937e0e041748f273b77a3c7cf333d6609b5a8877590b6573867244077482793b5665d703e7108398e6219c175d7a5f12fadf83da2ab19d3ece16

  • SSDEEP

    6144:vHCbMTTkphQW/uoIuOB9u9dwEImeaDdYft:abMnkpKW8uko9Cm2f

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      a9d9bb6cc7e182958073cd1a65e73530

    • Size

      15.0MB

    • MD5

      a9d9bb6cc7e182958073cd1a65e73530

    • SHA1

      8782e15e4ef851b36f6697604c2425f216cd3071

    • SHA256

      c3639689bd22abc6ad8605e9ed27aa0192f4790ab8de15520a69e7cf7f745fc7

    • SHA512

      cc49fe964c43937e0e041748f273b77a3c7cf333d6609b5a8877590b6573867244077482793b5665d703e7108398e6219c175d7a5f12fadf83da2ab19d3ece16

    • SSDEEP

      6144:vHCbMTTkphQW/uoIuOB9u9dwEImeaDdYft:abMnkpKW8uko9Cm2f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks