General

  • Target

    b094dc323b723414751f786f6734256e4b8027b54e505f5bdada9de1b5a1297c

  • Size

    236KB

  • Sample

    240719-q1rv1stfrr

  • MD5

    2b2b84bbc5e66eee80967ca156c41ce7

  • SHA1

    72c4caae5360f2c4d9c82ad955cd1b039576827f

  • SHA256

    b094dc323b723414751f786f6734256e4b8027b54e505f5bdada9de1b5a1297c

  • SHA512

    7551a325e564cf8cef82560c89fe31b222627a207a55d01656ff362715ae9ec1138e0ccd23181de9aab9e754f771b7bfb96ca55e5280ed3f228820a857cd6fff

  • SSDEEP

    3072:sKqzQ0Lk5DYZJCegjl8Td8laN5zi1nYf2bInzyX0aJcGNt4z:sKqYizCegjln65yy2knzyXJqy4

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b094dc323b723414751f786f6734256e4b8027b54e505f5bdada9de1b5a1297c

    • Size

      236KB

    • MD5

      2b2b84bbc5e66eee80967ca156c41ce7

    • SHA1

      72c4caae5360f2c4d9c82ad955cd1b039576827f

    • SHA256

      b094dc323b723414751f786f6734256e4b8027b54e505f5bdada9de1b5a1297c

    • SHA512

      7551a325e564cf8cef82560c89fe31b222627a207a55d01656ff362715ae9ec1138e0ccd23181de9aab9e754f771b7bfb96ca55e5280ed3f228820a857cd6fff

    • SSDEEP

      3072:sKqzQ0Lk5DYZJCegjl8Td8laN5zi1nYf2bInzyX0aJcGNt4z:sKqYizCegjln65yy2knzyXJqy4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks