General

  • Target

    a9c79d6a8cfcbd21d8ef5aa56036d50a393dda9e4a56c541d8c6b11253b0a485

  • Size

    141KB

  • Sample

    240417-rj1l9sbd34

  • MD5

    cbe58673cf8626741486b02bd8a20860

  • SHA1

    7b161eb00f5501a254cff39a21e64e03adb1dc75

  • SHA256

    a9c79d6a8cfcbd21d8ef5aa56036d50a393dda9e4a56c541d8c6b11253b0a485

  • SHA512

    0b37851324e0f953625b551b5c539c7578eafbc506ffc1fa4aad0ecace27e10fa1faa577a5101adb992bfd4cd21c6f7929ef6e01a74c4e1b0ed819d1dd02703e

  • SSDEEP

    3072:eMFHYIn8etGOUfFK2RJZ8hCR4dMYBJMFJEE9rXF2W9rhWiPS3rKZLtCxP:DFvlGr99XZaQtYoFJEiL4MIra+

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de.exe

    • Size

      227KB

    • MD5

      1010b86bd744c31ecef5f5aeae5ca6df

    • SHA1

      79dbaab22a85e8a0c3124d39423da1ca24c358e8

    • SHA256

      a7c2b8d081407da5d72f12eeef21c11674ff616c89be40f73f114c292c09e6de

    • SHA512

      6823068623029c10aa0d833be8422b6d93663832d24298bd9811f7700bbc56dc5463fd75f12273e2168bac6784a16e735cc86cf0de8841e83c1befc75bdfd02d

    • SSDEEP

      3072:BG/VLLNVnlMoDjq0sg0lpb15L76ZhBUrIeGskK+KgPcf53whT5A/hTu:8Lh9ljdOlPB6tUrIK+zPcRaCpT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks