General

  • Target

    2495cf2f8329c199790f63b358c963fc336645952c11575f6401049c23823201

  • Size

    127KB

  • Sample

    240417-qkynmahb43

  • MD5

    292196631428a35bab69828fc8103336

  • SHA1

    3f1e11c025069f7e1bed352d0f2649d313270ac5

  • SHA256

    2495cf2f8329c199790f63b358c963fc336645952c11575f6401049c23823201

  • SHA512

    8766d22be416b10b622958ab4fe3eaeaa101d9c44fc073a29dce65f20cef96ba3552043f8ec4f55bdd22bfe97a0c7a90687f921106f9934318dce4d252e6c0dc

  • SSDEEP

    3072:eq1zktK6abMPBbOPoz7rtNENX20+EuI3SpG70W042F1m:/1zp6aQBSPowG0+92SpG9042zm

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      755b1b45c26d282f094d504074bbdf897f6460968db67dd7d88a4702e03ef7f9.exe

    • Size

      203KB

    • MD5

      d88f7c78b3be6c96c33b80a8e1bb85de

    • SHA1

      ce07fb26b0ec69cdf563f98560aa4f7f298e6e8d

    • SHA256

      755b1b45c26d282f094d504074bbdf897f6460968db67dd7d88a4702e03ef7f9

    • SHA512

      1c396a26da383d01ddc317bc4c565c5825b0e452bcf262ac849cd720acb6cb7abcc08e895041e59246dd7686e72424990728745716815a5879bce30769e3e898

    • SSDEEP

      3072:Ef3B/ALaZdXUNc8iirJiM21K7uSbrF068c0E0rBNWRDxlH+cmH:Ef32clVO598c0EHxQco

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks