General

  • Target

    f6609c2b49b1b74f2061c0f367fb90237f417dbd7c412e4142f7103ccefc6965

  • Size

    127KB

  • Sample

    240417-qvv1gsbd2y

  • MD5

    aa32bf790fc7f05704a932a87ba15a90

  • SHA1

    a93f031087bc97e2f72410890802f893dd96aefb

  • SHA256

    f6609c2b49b1b74f2061c0f367fb90237f417dbd7c412e4142f7103ccefc6965

  • SHA512

    256d0dd55073ca43989494e910a7d23e4bc699df348353e4052c673a86d81a418d623b5aadfceede6f67aeaf1b90f8260f3a94a5119fab9efdd7dc4a5f3a80d0

  • SSDEEP

    3072:+rJUb1Tp1TMNhuYfe+lkxnubxjtyPl5icEtBDBK:yytpAEeqPl5icEw

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      755b1b45c26d282f094d504074bbdf897f6460968db67dd7d88a4702e03ef7f9.exe

    • Size

      203KB

    • MD5

      d88f7c78b3be6c96c33b80a8e1bb85de

    • SHA1

      ce07fb26b0ec69cdf563f98560aa4f7f298e6e8d

    • SHA256

      755b1b45c26d282f094d504074bbdf897f6460968db67dd7d88a4702e03ef7f9

    • SHA512

      1c396a26da383d01ddc317bc4c565c5825b0e452bcf262ac849cd720acb6cb7abcc08e895041e59246dd7686e72424990728745716815a5879bce30769e3e898

    • SSDEEP

      3072:Ef3B/ALaZdXUNc8iirJiM21K7uSbrF068c0E0rBNWRDxlH+cmH:Ef32clVO598c0EHxQco

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks