General

  • Target

    24f1b434e385d3d39a3a3a2fe419add51f9acb25b2e0cb678141aced37883e1b

  • Size

    145KB

  • Sample

    240417-qg59asgh78

  • MD5

    464509fb59196ada2d3808f383d70073

  • SHA1

    7e8041944a9c41405088fca63247e0aa2f36e080

  • SHA256

    24f1b434e385d3d39a3a3a2fe419add51f9acb25b2e0cb678141aced37883e1b

  • SHA512

    1f8b5bb9edf6ae573598a6d13d24b1107ab565e7aaa05cf7541364013989b137d00c0caf7bd567958985026a8af390d1a4b2358afaa8c5b7ca88a3e02ebecbd4

  • SSDEEP

    3072:5rogzINnRHQ6rC2ooxvk3wFJ9AnipIcaKuXzgFl3D:NVINRHQ8hooMwWipXalXzWl3D

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b557b082890ce023270e4291073976f24d7e68b1ab58890bb95b310785142992.exe

    • Size

      229KB

    • MD5

      68502dbaf73be1eca888f78e3b06d55a

    • SHA1

      14654e87e085e07b91535c7e4e8bc5f41ced65e4

    • SHA256

      b557b082890ce023270e4291073976f24d7e68b1ab58890bb95b310785142992

    • SHA512

      d87cad3ac8f7f18cb12e63c9bb6a74f29dabf09d5374c64d51ce7a1b3621fd65e454ecf6ff0d0551b80685117b450abf50494b669ad48d5a9906b44e7364d6cb

    • SSDEEP

      3072:+nBlv1nZAbXsdUs0vEJier1K2x5b2CZ/P20DMb9rAn5M23R8Gj7mkg+cmH:+nBXk1fmK+G0DMb9rA6Gj7mkHco

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Disable or Modify System Firewall

1
T1562.004

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks