General

  • Target

    dc63c79c3f7bc083812b8e8f47c44902.zip

  • Size

    192KB

  • Sample

    240831-hrlnms1dpf

  • MD5

    2e1d4419d0bba44d6b13acf7daf4fd7e

  • SHA1

    2bb303efc6233efaa374b5bbe61124f9d93a2319

  • SHA256

    1806e405c12737768f8c99f5e04d781920b2585283d82ff0683203fe5d991eda

  • SHA512

    321dcd7ade31e535822f4e6082481891630a579c2fb3884da4f76d7cf53383d7aef61745f75a2412aa45ae4fa28271b326e2fd694a5397967155a28bf007cf9b

  • SSDEEP

    6144:V/72CwV75xp56SjNjmWLHNIFaUTTdKAXjl:pw5T1jRmWLHNIFaUTTdVzl

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d29a3b017f6a864c855fca570073d822bb37a77006467b8a75f04ce7edcbfedc

    • Size

      14.5MB

    • MD5

      dc63c79c3f7bc083812b8e8f47c44902

    • SHA1

      640329ba407b6ed8482d2d5e0d082847451a7d37

    • SHA256

      d29a3b017f6a864c855fca570073d822bb37a77006467b8a75f04ce7edcbfedc

    • SHA512

      5610cb53a6274f62be4e9341f6eb0fda3e28ccb4f69b344b63c4a531f9044ca758519f89aacc5d312624962606e80333ae38fab9ea84e453513c7f754e6b2534

    • SSDEEP

      12288:OZlC6v/5oQU6buXH53333333333333333333333333333333333333333333333n:ObjvluXH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks