General

  • Target

    b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.zip

  • Size

    94KB

  • Sample

    240521-gndm7agc86

  • MD5

    cb7f3d96aa11ed91dd1fb22a073979d8

  • SHA1

    dc2c33a69e1ef9549c91c20b7ba62d095579c2fa

  • SHA256

    b55e29f2ffb735cd962d5a169638239c8cdf4f5a5b915a215cad62ba11bd086b

  • SHA512

    e92c5a5ab39a70b83d734cffce1ed0d2a3791299b1a88367a698614d1939b68b20599af1699dbdbe259979edde46a5554206929288afe14b925550815f0aea33

  • SSDEEP

    1536:1J6N7fBvWxNFPs9i/Pil3+hkK/7OgDgxyfxUXhhboxqt0i4bK:3695MNhs9i/PPhNDOgJfxUkYt0i4K

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.exe

    • Size

      178KB

    • MD5

      a6c7dd82eace106350d20d93956360e6

    • SHA1

      19c5ea0607b527e4c2b08a39583db38f503933e0

    • SHA256

      b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f

    • SHA512

      6e3d950e1a16103710985e9e0993f26ece5f7d67eadbd711941e826117d0d884624ddf166d3a70e25453518bb2f7d9a9c2dede25f6785dcb24d6031ba29c419e

    • SSDEEP

      1536:DAc76NGJEzLoCPMkXzxIGzA9aRmNjo/Phcnr6xMtxUtoIlESP5tA9bDQqpN+X:D7kXzxIGzA9aUo/PhcnVHUtoe5K9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Disable or Modify System Firewall

1
T1562.004

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks