General

  • Target

    04b285f5454574c1eff634abc22b111ef5a9c00d318daf8efe587f2a06a985f9

  • Size

    145KB

  • Sample

    240417-pj6geagb2z

  • MD5

    028bd4dd495d4378d37ab427cd649b88

  • SHA1

    a61f57bbfa5e325faaaa776e8cfd208463288b3e

  • SHA256

    04b285f5454574c1eff634abc22b111ef5a9c00d318daf8efe587f2a06a985f9

  • SHA512

    c839b0a289dc6a449406cca1e67deabd278c6a1a8658807f5d968de2ce01b497288f31027eeca917542621eb9eccd5cce102e2bbc4173cf7a00950aa050dbee9

  • SSDEEP

    3072:krxi9bDtsH+GXzkYFhg8YiQbmSBOkU2w1/KTSnjtP5F:LbB7GXzkWhfQP+22STUjtxF

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      8960100ed18988a177edb0c6825ebe9319cc350c344ce7ce40df4a9d50c44e6f.exe

    • Size

      228KB

    • MD5

      62abaf2cde2460be94b6fc5d5917cf14

    • SHA1

      ef808492171ea4fcc8b85a6ec553544ebff2dc26

    • SHA256

      8960100ed18988a177edb0c6825ebe9319cc350c344ce7ce40df4a9d50c44e6f

    • SHA512

      fb511c078edb9971c8c7c073441f6ef0d1fededa093d7991f6e54c40e7c9144e67c45dbbdec22b5ff93111846f687fcb22456c4b2c03b7b01b3858eaab1792c7

    • SSDEEP

      3072:7VpLtaCoeUUb4Ji0/7t+/KFQbMdLY8aXIbHQSLkJl4C6FD81OL6OwR2Rsb4Mf7U0:JpLt3/bc/taYtLkqKLOOX7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks