General

  • Target

    0f3b00054eb936e4064cccf117770df301e571f94d6a84ab2b9e7313c35008ec

  • Size

    10.8MB

  • Sample

    240620-kdthfascnq

  • MD5

    8b1a03576a343231a6dea02fb795c4f2

  • SHA1

    268ea8a541dd86d02f34770ebdafc5ef7a4a348a

  • SHA256

    0f3b00054eb936e4064cccf117770df301e571f94d6a84ab2b9e7313c35008ec

  • SHA512

    e09e55f60a1db195acd3de91bc900a8516641f32e2c51b6e3341580c249def8e84daecaed393ff49698f26dba81c37fad8c44d67c2beb15eea34d5b083700403

  • SSDEEP

    3072:SCnHFEJgedCWkkqh6hQ7W7U+o/63uGRg/0JUxq6R/lGEk/Ib1Vbfhrq6JppppppZ:S46VdFq4of+oixRC+slxFOITbo6

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      0f3b00054eb936e4064cccf117770df301e571f94d6a84ab2b9e7313c35008ec

    • Size

      10.8MB

    • MD5

      8b1a03576a343231a6dea02fb795c4f2

    • SHA1

      268ea8a541dd86d02f34770ebdafc5ef7a4a348a

    • SHA256

      0f3b00054eb936e4064cccf117770df301e571f94d6a84ab2b9e7313c35008ec

    • SHA512

      e09e55f60a1db195acd3de91bc900a8516641f32e2c51b6e3341580c249def8e84daecaed393ff49698f26dba81c37fad8c44d67c2beb15eea34d5b083700403

    • SSDEEP

      3072:SCnHFEJgedCWkkqh6hQ7W7U+o/63uGRg/0JUxq6R/lGEk/Ib1Vbfhrq6JppppppZ:S46VdFq4of+oixRC+slxFOITbo6

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks