General

  • Target

    5cf2924b8575066f7a4c1cbc4195510745c684f250eaf85bf225027d982b86f4

  • Size

    148KB

  • Sample

    240417-qvenhahg42

  • MD5

    2ffeae1cade8986f86e86e6783db0bca

  • SHA1

    ba8e6509089ff07ee4c5221695830822d203bfbe

  • SHA256

    5cf2924b8575066f7a4c1cbc4195510745c684f250eaf85bf225027d982b86f4

  • SHA512

    ff3bb1422b6a786eaa13a5d174b42e1104317270b7d1f57cd0b4004e479e2b99ca5515dfb2860628d48eb8d0d679cbebb103f255d7faeca95ab4d02ceb970c45

  • SSDEEP

    3072:xU8CgQZ+sCpqOi3GlULAO+a1Fpsla8eKEtpse8Ub1UhQ9T3xPK:ut+T9SLLAMIla8eKEr38dhQ9ThPK

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      58892f621a5b05339536004b2102cac88ea63b2148b784ea7a4745c27633444b.exe

    • Size

      244KB

    • MD5

      9e93e282ed9483fa5278557953accc51

    • SHA1

      48f5f7ab95997f0482c1f5259e8e4ca7d96df2b8

    • SHA256

      58892f621a5b05339536004b2102cac88ea63b2148b784ea7a4745c27633444b

    • SHA512

      bbe4ec3158e98d9fdba29694f355fb13cb5a7232599db0c14abb0bcf70a1921e9e0c590e9c2c9182b900d3c4b29e361397ab9eb14f9570de6dfcceb27a1965b2

    • SSDEEP

      3072:s/5SqeWVD3RRzOpABGPwgOnNnSU59mTYlCroDan0/3gmvfg3kwjwC/b:ABJ3XO6cYgOnNnP59mUBa0lfJe/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks