General

  • Target

    914f74e19d0a6b1501f2942ddd8eb78ed51ffd25da203c779ee05591dbb9b0b1

  • Size

    11.5MB

  • Sample

    240522-lc2yvsae47

  • MD5

    342973c7facd1fbbfbfdae4e873dc4a0

  • SHA1

    782bdc0091de61f185e018b7b7756b95e0233b91

  • SHA256

    914f74e19d0a6b1501f2942ddd8eb78ed51ffd25da203c779ee05591dbb9b0b1

  • SHA512

    a7348615c23e18a48decbfda93e9a7b8862abf680bafdfff8daf558ae64567b431ee1cac4f05a044e9703a513a77e8dff9ef42f0d135efe7d03cb2aaa96cea15

  • SSDEEP

    6144:5S8dp/oVs7UHb+KCmkxdUtCEUiiqpL3ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZv:IgAVwUHbNKdZPqN

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      914f74e19d0a6b1501f2942ddd8eb78ed51ffd25da203c779ee05591dbb9b0b1

    • Size

      11.5MB

    • MD5

      342973c7facd1fbbfbfdae4e873dc4a0

    • SHA1

      782bdc0091de61f185e018b7b7756b95e0233b91

    • SHA256

      914f74e19d0a6b1501f2942ddd8eb78ed51ffd25da203c779ee05591dbb9b0b1

    • SHA512

      a7348615c23e18a48decbfda93e9a7b8862abf680bafdfff8daf558ae64567b431ee1cac4f05a044e9703a513a77e8dff9ef42f0d135efe7d03cb2aaa96cea15

    • SSDEEP

      6144:5S8dp/oVs7UHb+KCmkxdUtCEUiiqpL3ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZv:IgAVwUHbNKdZPqN

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks