General

  • Target

    a5bb6d566c4c9a22c069bd3fe5624e893fda78d6c4a7321bbc9c3ffce9c55159

  • Size

    151KB

  • Sample

    240417-qs6zzahf55

  • MD5

    201b2f40f13b20813c9fc74149465f40

  • SHA1

    35f996a00e23431b34498c768994832b87fb3614

  • SHA256

    a5bb6d566c4c9a22c069bd3fe5624e893fda78d6c4a7321bbc9c3ffce9c55159

  • SHA512

    b877769d7fb7200f66a7f1576d30bd3387f0bd6da9b0d614755116129ab1ff6a1dd473e4c1fd997ac4c5059549d2cef8328d3301ffe38032f784c3a7ea886986

  • SSDEEP

    3072:yifKcSkU0MAGI/JM7UZptIyKjb09AiMWYOjSrUDPSYLiypui/:ZKuU0MGO7UZpWyK3XNPOj8UDaKiquq

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      3d24879020f71f37768efb2dcd3724477b190b9f0c7f87c72edb472f81123ec5.exe

    • Size

      238KB

    • MD5

      761915a4ae82207a72f8b60786d00a97

    • SHA1

      0892117051b95db0240247a83d9798c103b05897

    • SHA256

      3d24879020f71f37768efb2dcd3724477b190b9f0c7f87c72edb472f81123ec5

    • SHA512

      6dbb4dbf15d9c9f086394b6a52a2d59736b8454f525bdb39253b1a289f511edcd5fe33c43c1baf0cfa2aba186710d5442d111ce2343a6f2a26c82913c1eb2d4c

    • SSDEEP

      3072:d/PLinbwusnVoPhS6dxuUo6U4Gn0gDbsw6QeKWl+4zQ/ZwBV7VP:d/PLCbxuUYGgDbskkwg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks