General

  • Target

    00362f4dc849e0f365e81594caaa7a62e67599d0d71bdea467100bacccd8facd

  • Size

    167KB

  • Sample

    240417-qhnqmsgh97

  • MD5

    d71e4d0e3300c28c943204ce2ed09d79

  • SHA1

    7887d1bda4945aeb2545c91603aed9a6d829dfff

  • SHA256

    00362f4dc849e0f365e81594caaa7a62e67599d0d71bdea467100bacccd8facd

  • SHA512

    d9adf9f9768c4dd595ce9293ac2f2b551f7fec118d728d6823ecc241c7cca88bb0fe3a08f769417a288cead847144b9e19f39ded3f4accf4b6d4c205f09642d9

  • SSDEEP

    3072:DHvPoXkf/8luxLEc/Wvikg9psPOx1EySw1HZQJrnle0UqE/b17dQA4TR8WUFJdUE:LwQ0IV/Wv6npxqXdJrU0UqkR7dQxKWKf

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b09798c07fc468fb557b044326305a10d5b4a7b19c0d6adb88f794990c3634b9.exe

    • Size

      281KB

    • MD5

      45c66a2034297abfc6b5543dfbac04f2

    • SHA1

      21aea98d43c6d0aa86b8ee1777cc51cfae5a634f

    • SHA256

      b09798c07fc468fb557b044326305a10d5b4a7b19c0d6adb88f794990c3634b9

    • SHA512

      a341910130e4a040f02405c553556851cddf6ac2396f7e0d38aa0c7a97894aa9dece5cb9a7ce323bb50f221cfbc27d29641a4ccdc4843af09f9f54a14e6c19ce

    • SSDEEP

      3072:auyDaJPZdL7cHeyf3XJ+rs+MlhxMMKe4uquK9RbPf65xfzW5ffXq3B1k48cV1JD2:auyWJDLwHzf8412Mebd36/fkfAB1pJd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks