General

  • Target

    66f1471577c3fd73acd71d4bd0317410_NeikiAnalytics

  • Size

    226KB

  • Sample

    240509-r9mhbsfd8x

  • MD5

    66f1471577c3fd73acd71d4bd0317410

  • SHA1

    bf5608bab94ac20b4cb035f029037e9ab01261de

  • SHA256

    32e5898172c5f72671362353658b1e0e17f9dd1dff54d05df4aa2706f31a5b8a

  • SHA512

    bcfee081b3d338a5f6ff371afd75be86e3e78fb410b5ce684be4a1cad0ad820764ef68e65786da818f7b9e25a097fac9ce748e97ff92031ed0b703a5f2badf6b

  • SSDEEP

    3072:Vs6LoMMZ72uOA+TzcR3c+q57NKDj47uz2wMF7cIZH3gFT+Hzet:lyFrPqKXgwsZH3gFToq

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      66f1471577c3fd73acd71d4bd0317410_NeikiAnalytics

    • Size

      226KB

    • MD5

      66f1471577c3fd73acd71d4bd0317410

    • SHA1

      bf5608bab94ac20b4cb035f029037e9ab01261de

    • SHA256

      32e5898172c5f72671362353658b1e0e17f9dd1dff54d05df4aa2706f31a5b8a

    • SHA512

      bcfee081b3d338a5f6ff371afd75be86e3e78fb410b5ce684be4a1cad0ad820764ef68e65786da818f7b9e25a097fac9ce748e97ff92031ed0b703a5f2badf6b

    • SSDEEP

      3072:Vs6LoMMZ72uOA+TzcR3c+q57NKDj47uz2wMF7cIZH3gFT+Hzet:lyFrPqKXgwsZH3gFToq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks