General

  • Target

    764f9d0d270efd32b73723512d72556ed118d42fe7a616550c78fa2a9ee0790b

  • Size

    159KB

  • Sample

    240417-qkk3jaaf4s

  • MD5

    f72822ada51abacf01440aeb9c8762b9

  • SHA1

    86fa37c1bfccd10b0d0dd04cee40400381c26829

  • SHA256

    764f9d0d270efd32b73723512d72556ed118d42fe7a616550c78fa2a9ee0790b

  • SHA512

    8aec744ddcbfe85c43f8efd813d1ccb18b4561f54269f3c24f7c3b740394880d640ae5e543142fd6495d05f7205f70aa2bf58558552b8c2fdef78eb39a016486

  • SSDEEP

    3072:BuMpDTxuhn6GiuAazCInfzy8vHtBzK27f/kUi0bVuCli3gqVyqlziq2ERhhI:wGfEhnniu3nfzyytBzD7fNDECw3vYwmL

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe

    • Size

      258KB

    • MD5

      c604511f8c117ca36984e8aa66ac0a71

    • SHA1

      7ce156eb70e31fbdf62c3d7e60e6eefff7b21c7d

    • SHA256

      0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4

    • SHA512

      031ffc652bd29c52b8ea733fa6a9e37c9908798d4121d0452c2e0207d17086f43451c273b686ef4c086fc859fe6cf906e403bd09008b11cfc2498ec338ae3441

    • SSDEEP

      3072:xkh5eI/cSz90u2DEJClClQoyLwETsrw/eEOobr6e7AXa2jyQfEBw0coqY7IQPJUD:xkh+BEQ0SBTRVOobrPXYES0cWEQRER

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks