General

  • Target

    912d8df602e91edd42811bf1f20582e5ba112564708c7b0c6c287cc293bc1b24

  • Size

    159KB

  • Sample

    240417-qv95eahg87

  • MD5

    c71e274ace2903d22577098986e73b22

  • SHA1

    6e3754d5a608bf6b4e936cb2fbee453b6c55334a

  • SHA256

    912d8df602e91edd42811bf1f20582e5ba112564708c7b0c6c287cc293bc1b24

  • SHA512

    802624f93a2f3e3d39a1f6a7a868d760e825cd131617ca8e28e4b99218765f26955c3a07ca9a1f61030203a72c1ae926b180e83f3e215ef22578d6ecf1de492a

  • SSDEEP

    3072:izqq7O6IkiVCVN7ZJ4fM2pCMa7dBiCuI22oWxwh1ZsFvqhwgyOswGK:E7O1CV5ZCM2giI51CT1/bswGK

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe

    • Size

      258KB

    • MD5

      c604511f8c117ca36984e8aa66ac0a71

    • SHA1

      7ce156eb70e31fbdf62c3d7e60e6eefff7b21c7d

    • SHA256

      0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4

    • SHA512

      031ffc652bd29c52b8ea733fa6a9e37c9908798d4121d0452c2e0207d17086f43451c273b686ef4c086fc859fe6cf906e403bd09008b11cfc2498ec338ae3441

    • SSDEEP

      3072:xkh5eI/cSz90u2DEJClClQoyLwETsrw/eEOobr6e7AXa2jyQfEBw0coqY7IQPJUD:xkh+BEQ0SBTRVOobrPXYES0cWEQRER

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks