General

  • Target

    7f0c6ca42041259ece6fda8841d56353e0794664dd023c9da158bd53bdfb8410

  • Size

    141KB

  • Sample

    240417-qt5tashg27

  • MD5

    71a941c434b60be3fefdc4b0daf94109

  • SHA1

    0b5705f11de823950c78e0996a09c6fb37af3c46

  • SHA256

    7f0c6ca42041259ece6fda8841d56353e0794664dd023c9da158bd53bdfb8410

  • SHA512

    9bb28a7d59bbe6e71206b8b56bace13a44babdb939f5f783664e6aba51cb8a12613d50d1a68fae85f3b73908a41b776212694540dfa28726e5f97fc1fb87853b

  • SSDEEP

    3072:zkNxIamp+q9hC8nqi/qK/PvgwSmrlCXaM1AM7NDVlLiY:zixyq0/HIayp1AMxDVlLP

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de.exe

    • Size

      227KB

    • MD5

      1010b86bd744c31ecef5f5aeae5ca6df

    • SHA1

      79dbaab22a85e8a0c3124d39423da1ca24c358e8

    • SHA256

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de

    • SHA512

      6823068623029c10aa0d833be8422b6d93663832d24298bd9811f7700bbc56dc5463fd75f12273e2168bac6784a16e735cc86cf0de8841e83c1befc75bdfd02d

    • SSDEEP

      3072:BG/VLLNVnlMoDjq0sg0lpb15L76ZhBUrIeGskK+KgPcf53whT5A/hTu:8Lh9ljdOlPB6tUrIK+zPcRaCpT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks