General

  • Target

    e75089e05f365213c69757673dfd334bbd46af1ef8a68b1cbdd7d1741a4381f2

  • Size

    155KB

  • Sample

    240417-qtjk3abc4y

  • MD5

    96d9d5ed9b3456c18ecbf76b351057ab

  • SHA1

    ad7dca9cb4b3f015f5c3e1d2914f33657c592aa4

  • SHA256

    e75089e05f365213c69757673dfd334bbd46af1ef8a68b1cbdd7d1741a4381f2

  • SHA512

    2ee9a941b370f1faf480c355d8759a71cfc0a9b79d4a63a5f39fed97e3abda35a5c87cdb0f20d092fdcb8303c73905c8c505263c35929f775f989e4df4bef555

  • SSDEEP

    3072:S15G/Axbem+ejr388yoKNK9GGznSmU20hpYpNXc4tZ4/w6pe:STkAxyHef3DlmPpqXBEe

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b71122e4dea173f9fb6946e17de8c1b44ada3afd08f6eb93cf39dc6eaff046da.exe

    • Size

      257KB

    • MD5

      1878343378de0f934ea65fab5939a59a

    • SHA1

      0562a20680014897f0c60769c56cdfbadc42596a

    • SHA256

      b71122e4dea173f9fb6946e17de8c1b44ada3afd08f6eb93cf39dc6eaff046da

    • SHA512

      e2abb6ab92c9f025e8eb077c6bec3e7a56538e31d765cd841e65d100fcd88baa14e52926cd7da2eea6367f42e1950db2b98ccd2d2a454114ad9a22b12dc066a0

    • SSDEEP

      3072:q9/0bgFaqtTkenNkcS542ov3BQWDbZpAMzCO/hVlFmg4WBlx824dELM6HTxBG12Y:0sbmDnGcS542F4bfntDlFSgnfo+b9Y

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks