General

  • Target

    0e133075be0865484b62e1851cefdd946e2e03791c65d941ed11b59be9ab05f3

  • Size

    141KB

  • Sample

    240417-qg5mrsgh76

  • MD5

    cca32e481fca43089061de0f45a6e9b6

  • SHA1

    26274e2767ce71e16d396987c585e3771a23b4b4

  • SHA256

    0e133075be0865484b62e1851cefdd946e2e03791c65d941ed11b59be9ab05f3

  • SHA512

    1ea74892b31ea8da3fbb7c073452b3ad3fc44725edc95ceff9b6f0b0fb47f5ac45d38a5da05bdfebd371ce1b6443ffee01fd3e0077d62637596faceb3fc905b8

  • SSDEEP

    3072:dSXvpTxFrHIgblA7e7ciionbtyJFmGb25AhlNoHDIBuH:d2TxF7Ig6q5lbMJF9YAhboHDIB4

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de.exe

    • Size

      227KB

    • MD5

      1010b86bd744c31ecef5f5aeae5ca6df

    • SHA1

      79dbaab22a85e8a0c3124d39423da1ca24c358e8

    • SHA256

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de

    • SHA512

      6823068623029c10aa0d833be8422b6d93663832d24298bd9811f7700bbc56dc5463fd75f12273e2168bac6784a16e735cc86cf0de8841e83c1befc75bdfd02d

    • SSDEEP

      3072:BG/VLLNVnlMoDjq0sg0lpb15L76ZhBUrIeGskK+KgPcf53whT5A/hTu:8Lh9ljdOlPB6tUrIK+zPcRaCpT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks