General

  • Target

    b40c4e8d169abdd14c04db1958ad38c92340e78e436159723c530292d7cf601e

  • Size

    145KB

  • Sample

    240417-qthzjabc4x

  • MD5

    960d4aee524d6007784636205e9aecc5

  • SHA1

    1fd8bd82a5aeb56fcfff06b52f67bddcb5d04334

  • SHA256

    b40c4e8d169abdd14c04db1958ad38c92340e78e436159723c530292d7cf601e

  • SHA512

    5304076985d6e68ba03d4c37f2f7ab81d317e2250681ebd4333f55d8efd4610d41d9221f1a68edd6be801f776ec3a5ca47df5f4a9e49dcb2e901947fa61c2173

  • SSDEEP

    3072:L+iYRICeQv6+1hysMSnDZkiv1JLOs+XFk:L+i0dy+S0Vhv11vak

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe

    • Size

      232KB

    • MD5

      b5f3dc95c09fa3bfdf009a404736f94e

    • SHA1

      03e471e7edf9bbcbe2483ebd1ba05364c93a190a

    • SHA256

      f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be

    • SHA512

      f63cba660384d5296e2f8aeeceba1a2d4707311a242cd5f12220008670cb5c2bf686b546fafe03cc6c5363bd62fe4c067a1f9dc73a8388488e13854b631ee546

    • SSDEEP

      6144:j6zxC0r84BWnfZUH7SFcQU+9HFsvKMXOCU:kY0r9BeZUbSiy9HSvKwO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks