General

  • Target

    SecuriteInfo.com.Trojan-Ransom.StopCrypt.22110.437.exe

  • Size

    153KB

  • Sample

    240708-qkhmea1arr

  • MD5

    fed1740e597fff2d18ccd42e44d3f099

  • SHA1

    7fbf25801100278f9ddfc0a40e1cd8cd46fb0288

  • SHA256

    793959ab5ee6f59d49e330b808c2300772290f68bce04be397b1d02ea26833e6

  • SHA512

    20e9b344223d7d6ad891ecb2fda491c7e0b5c1f92f740e94d9d13091abba7278ac61a58457136befaaccbbc33606940d3dbb61e230fcf6b881777f5ae49532cb

  • SSDEEP

    3072:+0LookdnSvrOMsV2UAFe0mfU5LJLqTkAFUVwE7wQWLc:BLoo6eCMsEA+FukU

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      SecuriteInfo.com.Trojan-Ransom.StopCrypt.22110.437.exe

    • Size

      153KB

    • MD5

      fed1740e597fff2d18ccd42e44d3f099

    • SHA1

      7fbf25801100278f9ddfc0a40e1cd8cd46fb0288

    • SHA256

      793959ab5ee6f59d49e330b808c2300772290f68bce04be397b1d02ea26833e6

    • SHA512

      20e9b344223d7d6ad891ecb2fda491c7e0b5c1f92f740e94d9d13091abba7278ac61a58457136befaaccbbc33606940d3dbb61e230fcf6b881777f5ae49532cb

    • SSDEEP

      3072:+0LookdnSvrOMsV2UAFe0mfU5LJLqTkAFUVwE7wQWLc:BLoo6eCMsEA+FukU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks