General

  • Target

    e2f0b0cdbf6a708485ba8eec9b077310N.exe

  • Size

    72KB

  • Sample

    240819-mrg3nszaqg

  • MD5

    e2f0b0cdbf6a708485ba8eec9b077310

  • SHA1

    a7cac54cf95a2f2fe29da0133a28a33c1cc9916a

  • SHA256

    b744be865b905f904a65c905d5d98dfa695052dd24046deb6f929ebe23f65e94

  • SHA512

    6a479af02a021b45b256bb901527b8ce108c2297f1d9939566cd9da7ce27fe67ba2c161dc9dc6cbad6a3fc097735438ccc72d1e7607d0bfde3a691f30cd1849c

  • SSDEEP

    1536:TQzRMNmVCzUgZTOSnoFLSlR2DZVIsogQ4dytA11rpIl:MWmVCzUgVOuoglsbngAbrpI

Malware Config

Extracted

Family

tofsee

C2

103.248.137.133

59.188.74.26

115.230.124.76

111.121.193.242

Targets

    • Target

      e2f0b0cdbf6a708485ba8eec9b077310N.exe

    • Size

      72KB

    • MD5

      e2f0b0cdbf6a708485ba8eec9b077310

    • SHA1

      a7cac54cf95a2f2fe29da0133a28a33c1cc9916a

    • SHA256

      b744be865b905f904a65c905d5d98dfa695052dd24046deb6f929ebe23f65e94

    • SHA512

      6a479af02a021b45b256bb901527b8ce108c2297f1d9939566cd9da7ce27fe67ba2c161dc9dc6cbad6a3fc097735438ccc72d1e7607d0bfde3a691f30cd1849c

    • SSDEEP

      1536:TQzRMNmVCzUgZTOSnoFLSlR2DZVIsogQ4dytA11rpIl:MWmVCzUgVOuoglsbngAbrpI

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks