General

  • Target

    ab55372f5a55b9ce8010fdeafed574d0db6117761d7d1f5bdf881511228028b1

  • Size

    128KB

  • Sample

    240417-qvj8zshg54

  • MD5

    5980c5f673c77d1c7d9c3b6612c61849

  • SHA1

    971b49ebff67dba92f46f40afaaa98036cf8cadc

  • SHA256

    ab55372f5a55b9ce8010fdeafed574d0db6117761d7d1f5bdf881511228028b1

  • SHA512

    5e400ac026ad46af6c8beb12dfcc1cdb7e6eef6bfc0ecc848efa131d62c291d52bb9ee916aa6c8d705f9cc09f90507a396b924b397f2840ac91d3594532379d9

  • SSDEEP

    3072:EDcUmGyG6S+Vdk4M4hFcBRL/U87fNdm1Puj9Tn37:E3mG/ccfLc2dm1Puj9Tn37

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40.exe

    • Size

      203KB

    • MD5

      6b7204c0cb219b7d01999025ccd85fdc

    • SHA1

      1f57fbfdcf6d71d0d5a36602e1e83bc9dee3ac7a

    • SHA256

      8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40

    • SHA512

      68a19f84eb4d73394a2bb2b7629f9582e91b54713b19e71722ba5359636ce36d9aa9951af7b729d65752a7aff916ee91abd87f34c2e4aad43cebef777800742b

    • SSDEEP

      3072:eSf/dfuraZJXENc8uCXJiXK1K2LS1G2B+vioyUSdUuD5BBNcRrxOJ+cmH:eSf/MQ15t1TB+PSHexLco

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks