General

  • Target

    87092af98b1cd578e4f5d454634a6da8838a1ce5aa983646c2ca907e7e8a9adc

  • Size

    239KB

  • Sample

    240719-qszwnaxbjb

  • MD5

    17fe9cfc87e8f07c6c4b081e17856028

  • SHA1

    1268c4b05b12e12c6684f4c2de48556e3631f339

  • SHA256

    87092af98b1cd578e4f5d454634a6da8838a1ce5aa983646c2ca907e7e8a9adc

  • SHA512

    14af42343b34f319756842b1a4c75fb901bb1372b2d4f3f3f554b727799b2f7fa039b3608318b80bfd87781b9643e29cc183f5fe3e47c6c914d4fe7bbe4ccf0f

  • SSDEEP

    6144:Y9HP+2OttoeF95UVV1AW5C1xZyhecCTflc:02Dd5Un1DaxZvcf

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      87092af98b1cd578e4f5d454634a6da8838a1ce5aa983646c2ca907e7e8a9adc

    • Size

      239KB

    • MD5

      17fe9cfc87e8f07c6c4b081e17856028

    • SHA1

      1268c4b05b12e12c6684f4c2de48556e3631f339

    • SHA256

      87092af98b1cd578e4f5d454634a6da8838a1ce5aa983646c2ca907e7e8a9adc

    • SHA512

      14af42343b34f319756842b1a4c75fb901bb1372b2d4f3f3f554b727799b2f7fa039b3608318b80bfd87781b9643e29cc183f5fe3e47c6c914d4fe7bbe4ccf0f

    • SSDEEP

      6144:Y9HP+2OttoeF95UVV1AW5C1xZyhecCTflc:02Dd5Un1DaxZvcf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks