General

  • Target

    cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e

  • Size

    10.0MB

  • Sample

    240506-lba4rafe9t

  • MD5

    19f2564fe3b3636567957a0b29a78ac5

  • SHA1

    f4d8c30d67b9dad6bca7a703bb42578135fc966b

  • SHA256

    cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e

  • SHA512

    962c4c8bd1966f6e742e60625e326f112fd0eed2d045bab0c3dee92505982e11ef7cc71da2af22251ec580cfc77e50640e47dd7e81082f04973e53aa2d914b83

  • SSDEEP

    6144:rzH/2P/6m1uCQ/RqO+Wy+PqSb0iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:rT/2P/6m1uCQMO+W1Cx

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e

    • Size

      10.0MB

    • MD5

      19f2564fe3b3636567957a0b29a78ac5

    • SHA1

      f4d8c30d67b9dad6bca7a703bb42578135fc966b

    • SHA256

      cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e

    • SHA512

      962c4c8bd1966f6e742e60625e326f112fd0eed2d045bab0c3dee92505982e11ef7cc71da2af22251ec580cfc77e50640e47dd7e81082f04973e53aa2d914b83

    • SSDEEP

      6144:rzH/2P/6m1uCQ/RqO+Wy+PqSb0iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:rT/2P/6m1uCQMO+W1Cx

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks