General

  • Target

    b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.zip

  • Size

    94KB

  • Sample

    240521-gl6wysga39

  • MD5

    e9f605e4b03b9baf30cee09b910000f4

  • SHA1

    6547137feb16b183b1a68376d29f3cf56a969cb2

  • SHA256

    d4d0e2487f93f090ff5340bfce327c31cada201f0e6646098ad3be66981d438a

  • SHA512

    4d82b92a78f7570ea68f3849663da783e41e647358bc009767e0cb5335f94e8a4e4992ce83a0320f14c9436bb363019d8f4ce476a1872ffea6f2f7c1a148acf8

  • SSDEEP

    1536:W4SXErmDj72TovSLAE/eWSgyI/OJ5HiGdVb0H2KeAjNdbXSoIFOAPGX4FrAF4CpS:vSUrmf72U6LbLS2o5JmzHFNq9J9C3CEk

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.exe

    • Size

      178KB

    • MD5

      a6c7dd82eace106350d20d93956360e6

    • SHA1

      19c5ea0607b527e4c2b08a39583db38f503933e0

    • SHA256

      b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f

    • SHA512

      6e3d950e1a16103710985e9e0993f26ece5f7d67eadbd711941e826117d0d884624ddf166d3a70e25453518bb2f7d9a9c2dede25f6785dcb24d6031ba29c419e

    • SSDEEP

      1536:DAc76NGJEzLoCPMkXzxIGzA9aRmNjo/Phcnr6xMtxUtoIlESP5tA9bDQqpN+X:D7kXzxIGzA9aUo/PhcnVHUtoe5K9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks