General

  • Target

    6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900

  • Size

    11.8MB

  • Sample

    240620-kdt4zascnr

  • MD5

    1115bd97b549ced1b9c74e08e534d655

  • SHA1

    274950f5a96e621e789ab887dd2218ee792937b2

  • SHA256

    6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900

  • SHA512

    e12cf306376ccbc23498c7a9b1b5f5eb8a5976ad182484758187151322397e5211c25fa5829c02f6183534113630f8a11ff3e29cf51a02a2485f0750a7a48b29

  • SSDEEP

    12288:jsWR4IPuw0m+MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMn:4643w0

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900

    • Size

      11.8MB

    • MD5

      1115bd97b549ced1b9c74e08e534d655

    • SHA1

      274950f5a96e621e789ab887dd2218ee792937b2

    • SHA256

      6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900

    • SHA512

      e12cf306376ccbc23498c7a9b1b5f5eb8a5976ad182484758187151322397e5211c25fa5829c02f6183534113630f8a11ff3e29cf51a02a2485f0750a7a48b29

    • SSDEEP

      12288:jsWR4IPuw0m+MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMn:4643w0

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks