General

  • Target

    35f519000ad078d242c0bce097c59b31.bin

  • Size

    200KB

  • Sample

    240506-bhbnraeh83

  • MD5

    6f3d9b69732f16defa09f45b36ed9d08

  • SHA1

    dbd26eeb77e98f917ddeedbae360934f14c75adf

  • SHA256

    60ae3c1d83e93f2d3181e4d39e85629d981a87cec4f370d7bfd66a0d448352bb

  • SHA512

    e6aad3ca937df25522ca759ae6689be91d4848d34b0182b200b2454f5d6f372baf98d6815edfcef3ca7095c1bc34c898ca7834c5fe95987d5c0bce25d08784c3

  • SSDEEP

    6144:VmqPhym081df/J2zh1E282WibpLQLD7sN+fH:VxPnTnfgXdbKDA8P

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      1dc79692db8709e88fee042c5555f8432dc4638442887d8150b8b7c67f5f3eb2.exe

    • Size

      326KB

    • MD5

      35f519000ad078d242c0bce097c59b31

    • SHA1

      41a3c859c36a4240a51e6ce17ab269e8d2728eb0

    • SHA256

      1dc79692db8709e88fee042c5555f8432dc4638442887d8150b8b7c67f5f3eb2

    • SHA512

      260f2efe4757c518f96269ba3a3fd5b5c603fa6a52d9c0d976222158609911004ce48df4e75298c11de67ea29d91969f217986e4c0f1b83bb2f5d2a43a772997

    • SSDEEP

      3072:KLTZ5XJKQsp6NU4tqwCyc40r+oeHpmCR54kDSWegJSVE+Er20L4fdoiKuIov5QId:KbCt44p40rqHPbDb86r2LiNovrb/a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks