General

  • Target

    72baaabc47b6560279dfb391dd1589221d02dcc247e8c3862d903b190b49de79

  • Size

    9.8MB

  • Sample

    240831-gg4wssydpm

  • MD5

    1f060a2af21fe91a23a03b31444012bc

  • SHA1

    ef213b8600e09490d11b4e77f0e53c782435231a

  • SHA256

    72baaabc47b6560279dfb391dd1589221d02dcc247e8c3862d903b190b49de79

  • SHA512

    83e545b9ef706589e7ca299c07fba5329445b36c907d6d34c72114372f6067e8b0f8e76705f26a523daf324319dd552db8d102f503ca6ee20fd3710e60ba5dd5

  • SSDEEP

    196608:tobpeL2U2upOd9Zb3x9RyN6N/juzzz/9v8RCv1mIXPq6bM:tou9pOfZbh9RyNSKzzz/CwPq6bM

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      52d959c6afd889d69fe66d351a34769888c62ce16a140cac88b1303bd772dc5e

    • Size

      14.6MB

    • MD5

      6e734800376974cd4fbe0fbc91e0a138

    • SHA1

      7711d0bc3c0e82526029b67473cc5ee222933497

    • SHA256

      52d959c6afd889d69fe66d351a34769888c62ce16a140cac88b1303bd772dc5e

    • SHA512

      911b78fc44b16cd3e3337a320513081dd65f0dd671b1847c35187e3b7ea9603f0f16d869fb355cecffc6f22d02b4b1212a9fa3151bdc361b790cd648cd374c86

    • SSDEEP

      98304:8wfDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDr:8w

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks