General

  • Target

    1d9a98d4dc4c10d499a04c8070e29bb0N.exe

  • Size

    243KB

  • Sample

    240721-2cbpnsxgjf

  • MD5

    1d9a98d4dc4c10d499a04c8070e29bb0

  • SHA1

    81a61f606f98ce7c033726f048036545f65395af

  • SHA256

    beba1a09840a0af2331ef29b165ee129ae4d1d576083dac2d432ed1ea1e9e923

  • SHA512

    7996867dab22a562d1b11a1a639421aa7a1d57b9546c126a5fefc4d5a7fd6694390503015dd3b613128caa21731a74841ff26f216a1ea3a323b99ed4c269af70

  • SSDEEP

    3072:1599ET6fI1blSeZH0V+X4x6+x8tcCMurzqMPEkS5Kow1/KV5CyoAExT5:X9nfIlB0V+X4g/tWureqS0h1/w5ExT

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      1d9a98d4dc4c10d499a04c8070e29bb0N.exe

    • Size

      243KB

    • MD5

      1d9a98d4dc4c10d499a04c8070e29bb0

    • SHA1

      81a61f606f98ce7c033726f048036545f65395af

    • SHA256

      beba1a09840a0af2331ef29b165ee129ae4d1d576083dac2d432ed1ea1e9e923

    • SHA512

      7996867dab22a562d1b11a1a639421aa7a1d57b9546c126a5fefc4d5a7fd6694390503015dd3b613128caa21731a74841ff26f216a1ea3a323b99ed4c269af70

    • SSDEEP

      3072:1599ET6fI1blSeZH0V+X4x6+x8tcCMurzqMPEkS5Kow1/KV5CyoAExT5:X9nfIlB0V+X4g/tWureqS0h1/w5ExT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks