General

  • Target

    3313ecbafa522a59381fc255e0f8f6a05ef6979af079ba11949f62cc2c59a7aa

  • Size

    145KB

  • Sample

    240417-qk6dgaaf6t

  • MD5

    65413c362e076ebab3f28118c260aafa

  • SHA1

    3af5892f8ca79b67e13f6f92660049d64232e915

  • SHA256

    3313ecbafa522a59381fc255e0f8f6a05ef6979af079ba11949f62cc2c59a7aa

  • SHA512

    679f9f5951241f8d7bb90799376e0a0ffc0505a1f93a5cf91e775a6567e3c892a6d082adee4fd46847bd11c245151901a2dccf905a2026ca3d0bccc776033166

  • SSDEEP

    3072:7Y2mAZL71xzT8G+J1hXnxdhZ0E6kDNb8pJZYUx:7Y2mo1x7+L9xdv0mxQ1YI

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe

    • Size

      232KB

    • MD5

      b5f3dc95c09fa3bfdf009a404736f94e

    • SHA1

      03e471e7edf9bbcbe2483ebd1ba05364c93a190a

    • SHA256

      f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be

    • SHA512

      f63cba660384d5296e2f8aeeceba1a2d4707311a242cd5f12220008670cb5c2bf686b546fafe03cc6c5363bd62fe4c067a1f9dc73a8388488e13854b631ee546

    • SSDEEP

      6144:j6zxC0r84BWnfZUH7SFcQU+9HFsvKMXOCU:kY0r9BeZUbSiy9HSvKwO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks