General

  • Target

    5cec6e334d8ae04b9000b908cb6997793bcfe515785cc02effd82577be0256c9

  • Size

    292KB

  • Sample

    240720-xry2asxenk

  • MD5

    4b97f350cde14ef885f008ef0631eb7f

  • SHA1

    e444e7dcc6fe552f201c7e0898943a5d4f3ad994

  • SHA256

    5cec6e334d8ae04b9000b908cb6997793bcfe515785cc02effd82577be0256c9

  • SHA512

    f85ce96a292b29baa0b531aef078e589aeb4fa8e7ed7dd4915163c844f16f607e034008166bf3b4639c6c9b9ca06df42927d895b78c11c5cb15cdc866e147a56

  • SSDEEP

    6144:42TCWTR12XRt69y46ZjdQGXqMxJVo92CjQju:rD2XRt6JEdqUVotR

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      5cec6e334d8ae04b9000b908cb6997793bcfe515785cc02effd82577be0256c9

    • Size

      292KB

    • MD5

      4b97f350cde14ef885f008ef0631eb7f

    • SHA1

      e444e7dcc6fe552f201c7e0898943a5d4f3ad994

    • SHA256

      5cec6e334d8ae04b9000b908cb6997793bcfe515785cc02effd82577be0256c9

    • SHA512

      f85ce96a292b29baa0b531aef078e589aeb4fa8e7ed7dd4915163c844f16f607e034008166bf3b4639c6c9b9ca06df42927d895b78c11c5cb15cdc866e147a56

    • SSDEEP

      6144:42TCWTR12XRt69y46ZjdQGXqMxJVo92CjQju:rD2XRt6JEdqUVotR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks