General

  • Target

    6ffdd95672c25985f18119f284ffe3afd4bdbf8a20fea561b9cda90810338c6d

  • Size

    245KB

  • Sample

    240720-vt25mawcmj

  • MD5

    9b3caff8f9a37d16d84f8e7b224c277f

  • SHA1

    ddb6d3c4aa2dd7795964c04a159dfeb04ea4bc50

  • SHA256

    6ffdd95672c25985f18119f284ffe3afd4bdbf8a20fea561b9cda90810338c6d

  • SHA512

    d21e10bcafeed3279a50c3f03c839bf493840525208144802db64eb4ee516d782494519cae8278ebe87000ed735e3ebc1c6aeefe482c6dbe406da62c21459678

  • SSDEEP

    3072:dW1kXVPnGwhRH7DCT+cODJIHGfngWKKaedh1VUrE/LlhEI2U9JweV:dWQPGE7D4+cOWHGfnvKKB1bVVbwe

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      6ffdd95672c25985f18119f284ffe3afd4bdbf8a20fea561b9cda90810338c6d

    • Size

      245KB

    • MD5

      9b3caff8f9a37d16d84f8e7b224c277f

    • SHA1

      ddb6d3c4aa2dd7795964c04a159dfeb04ea4bc50

    • SHA256

      6ffdd95672c25985f18119f284ffe3afd4bdbf8a20fea561b9cda90810338c6d

    • SHA512

      d21e10bcafeed3279a50c3f03c839bf493840525208144802db64eb4ee516d782494519cae8278ebe87000ed735e3ebc1c6aeefe482c6dbe406da62c21459678

    • SSDEEP

      3072:dW1kXVPnGwhRH7DCT+cODJIHGfngWKKaedh1VUrE/LlhEI2U9JweV:dWQPGE7D4+cOWHGfnvKKB1bVVbwe

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks