General

  • Target

    0abc4b358f37c9c49835ccd3adec2130N.exe

  • Size

    144KB

  • Sample

    240722-zq62maxfqg

  • MD5

    0abc4b358f37c9c49835ccd3adec2130

  • SHA1

    3996477c3a5262fa442285319bc7e53c9b6c999d

  • SHA256

    fa516e81e02c453789dec877af057772b5e8b5ff97e3621b3b38065aa18914a9

  • SHA512

    904ed1c87a1be42455370329aec2f71ccff6d4dc4847b64f692ff11e509692c89d0655c935b4c02dc5b6afec2eaa192abd7f38e830c9e6200e7f5eb424105e6f

  • SSDEEP

    1536:2ai8yRlkj5a9rNzJLGDNGrNesEfL8St26Jsvf+HI5Qlr6pVX:URlm0WDc55qL8Sg6Ji+HEQlrSR

Malware Config

Extracted

Family

tofsee

C2

103.246.115.238

188.190.120.102

112.213.106.187

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      0abc4b358f37c9c49835ccd3adec2130N.exe

    • Size

      144KB

    • MD5

      0abc4b358f37c9c49835ccd3adec2130

    • SHA1

      3996477c3a5262fa442285319bc7e53c9b6c999d

    • SHA256

      fa516e81e02c453789dec877af057772b5e8b5ff97e3621b3b38065aa18914a9

    • SHA512

      904ed1c87a1be42455370329aec2f71ccff6d4dc4847b64f692ff11e509692c89d0655c935b4c02dc5b6afec2eaa192abd7f38e830c9e6200e7f5eb424105e6f

    • SSDEEP

      1536:2ai8yRlkj5a9rNzJLGDNGrNesEfL8St26Jsvf+HI5Qlr6pVX:URlm0WDc55qL8Sg6Ji+HEQlrSR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks