General

  • Target

    881e0d77937dfe04295b394212e9004db0bbad441ed40fab38a8a48216020bf7

  • Size

    240KB

  • Sample

    240719-zwyx7stcne

  • MD5

    4000d4183cb34633077012e5853c52e0

  • SHA1

    8a7816c227ebbd7ad29299f7b4caba89e32dc522

  • SHA256

    881e0d77937dfe04295b394212e9004db0bbad441ed40fab38a8a48216020bf7

  • SHA512

    375797bfca1bf017796f298943823a59160d9f932ffb6ef77e9b2da015bb7585c531964a829bcfc906a7f3ae6da1c64c6bc1dce92e99c925e5ff5dc8dd1628e4

  • SSDEEP

    3072:AdYyTQsx4c5U5Mzyy76jm5y2zvXpxgctPj1QfaYClo/cXqJBgNaCa:AdYcxDuCy8p5hpdKSUFcZ

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      881e0d77937dfe04295b394212e9004db0bbad441ed40fab38a8a48216020bf7

    • Size

      240KB

    • MD5

      4000d4183cb34633077012e5853c52e0

    • SHA1

      8a7816c227ebbd7ad29299f7b4caba89e32dc522

    • SHA256

      881e0d77937dfe04295b394212e9004db0bbad441ed40fab38a8a48216020bf7

    • SHA512

      375797bfca1bf017796f298943823a59160d9f932ffb6ef77e9b2da015bb7585c531964a829bcfc906a7f3ae6da1c64c6bc1dce92e99c925e5ff5dc8dd1628e4

    • SSDEEP

      3072:AdYyTQsx4c5U5Mzyy76jm5y2zvXpxgctPj1QfaYClo/cXqJBgNaCa:AdYcxDuCy8p5hpdKSUFcZ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks