General

  • Target

    e36bf98b40127034c9bb4be9db2f8238a73b2c3f7d125bf594c4c3dce7b0712e

  • Size

    172KB

  • Sample

    240417-qtgfpshf73

  • MD5

    66f5dd3453f8f47e236eedfb7d993a35

  • SHA1

    27c9669a988a4ff55adc11631ae3a6d9437742a5

  • SHA256

    e36bf98b40127034c9bb4be9db2f8238a73b2c3f7d125bf594c4c3dce7b0712e

  • SHA512

    d597e01b4ba6ea0aa4627b9aedad1f15557a43fb0351e2ab5a4cdc8325099652c35f52f6e0e31280f0ac35d7199dee40f59c47089208e12bb2043058afb1a81a

  • SSDEEP

    3072:Efrocx5U1q1XhJcqQeYAbdiiYGWxFrIV/rwkfv1Lx0y6c:sT1XzHQQfs+/rwkNea

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      e3cb143065ee2414007182694ceedcba541b748825eeae851eb395a24bd08053.exe

    • Size

      312KB

    • MD5

      2b41691ddeb229f6f01acd6f557cc319

    • SHA1

      104ec7b54ccd78b246fda9fd6cb73126f900dd96

    • SHA256

      e3cb143065ee2414007182694ceedcba541b748825eeae851eb395a24bd08053

    • SHA512

      f93a8141e145b21c1d07a93daa7685ff5916750d49119b3d1b5fbdc3e5727f1e7f7b0918a77d7ec49a3f8b478fe018bd1f0880c264a60e25b424d9abcb24698d

    • SSDEEP

      6144:pEE79GITkewAx4JkbdmdT7xJCsUuBT9p69a:pFGekTAx42h8TrCMB5II

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks