General

  • Target

    c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03

  • Size

    234KB

  • Sample

    240717-3m2vaavemj

  • MD5

    61867a71161ae87b02413bad06e53446

  • SHA1

    eb375d9b4b9089457e0b480f12d977ceb1655b07

  • SHA256

    c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03

  • SHA512

    43e7cfb44fd61e9182fddeab13add5cd6e6cb8ce3e5c7a728daecdf2bb6bc3f157c7c1ab666ae3bf5fb191341b5b43f9e3a4a9d98936b9881c4fc3c1b0be30bd

  • SSDEEP

    3072:jYnp0HalR5aEr0AZsLjhR7OcPlnr2YWwtq+BkkWMV:jYnp5G+fZsLjhRSilhzjOc

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03

    • Size

      234KB

    • MD5

      61867a71161ae87b02413bad06e53446

    • SHA1

      eb375d9b4b9089457e0b480f12d977ceb1655b07

    • SHA256

      c5cd4932ea8f02c3f8af95ab80eb1612329a657b6c1ed35982e3310e4ebd7b03

    • SHA512

      43e7cfb44fd61e9182fddeab13add5cd6e6cb8ce3e5c7a728daecdf2bb6bc3f157c7c1ab666ae3bf5fb191341b5b43f9e3a4a9d98936b9881c4fc3c1b0be30bd

    • SSDEEP

      3072:jYnp0HalR5aEr0AZsLjhR7OcPlnr2YWwtq+BkkWMV:jYnp5G+fZsLjhRSilhzjOc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks