General

  • Target

    244cfeb94a072b321d19019e769daee63ed9ec5eb0ca1ddb069c350ce6bef8e1

  • Size

    163KB

  • Sample

    240417-qt23eabc7x

  • MD5

    47be6d835a9fb5a0b4b2386b0c53b333

  • SHA1

    9a77ecb9d155ad11e063a913d58096aababf9d21

  • SHA256

    244cfeb94a072b321d19019e769daee63ed9ec5eb0ca1ddb069c350ce6bef8e1

  • SHA512

    15df3277f1d3e2afa3e198e193536ab14aa0122ac42b1dfe792dd4ec91453833bea40bbf527e612ade68c17b3acf4ee200959cc01164260455b37bdc901a00b6

  • SSDEEP

    3072:5PEeQf0utVsXchQxZ3TekmXM3FQmqJtEnkmCUic+bgqCkxWmkk3AuDma:Z7VunuIQrqkmXM1tbnkxNbgrkxFk3Yb

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03.exe

    • Size

      298KB

    • MD5

      462df7d53f23fe42745899349ed6d566

    • SHA1

      5d5aeb88f05f8bb21453aae94f46e0fe1723e3d4

    • SHA256

      d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03

    • SHA512

      6fc07a384d5bb94120142153eb693fb9b7195af2b68189bb7e8c5f204a69ec1ea4c1a1b25e69ee6bb348b61d2884a7e93c2f2373ef60075d8806902802bd088c

    • SSDEEP

      3072:S2WKB6KtS92/5HnwTFEaaCszMl5BQo5dQvVziXdHGHBW3hqHJlb6D:IKNS9mHeFEaa1I3BdcqdHGHBc4Jp6

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Disable or Modify System Firewall

1
T1562.004

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks