General

  • Target

    0906ff34f48334d4563ca2df39b3cef7.zip

  • Size

    179KB

  • Sample

    240831-m21yjazdmj

  • MD5

    6e6d9ddfd3ac28541f00df0d32381992

  • SHA1

    575772de8d7d5d85697afaa919aebdb8c600dd3e

  • SHA256

    e75528357e945973102cc65fbfe482090a4c76a9166a23b5ff60515884fd4ff7

  • SHA512

    853b2f0077d162d615c6e65eff9965a2558ed9af24703b353e24f9ff61bad4944be9ccb510b417f4ba766c64621c5c238c1ffbfed82acf6400381143d447de20

  • SSDEEP

    3072:0g90UTbIWujsyp6bdXlg+DqN7TpR0vRatluQHfD41zV5omF+99tND:5xCs2EVG/SvsuOfmVDFcx

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      181e6f88cf32348d8247bb3c4deb07bf44b677656b43b37a30dfad4a3b3e2935

    • Size

      12.1MB

    • MD5

      0906ff34f48334d4563ca2df39b3cef7

    • SHA1

      289a0a4287b6e42e680a9b7efa0585fd97708f2e

    • SHA256

      181e6f88cf32348d8247bb3c4deb07bf44b677656b43b37a30dfad4a3b3e2935

    • SHA512

      41545edf3fc63015f8bf2d094de7c17688889fbf4956fadd0b2447da2a870967606ad06971b3db4f28de7e8c777a1dcfec67bb8a99454d1598f1a42bb20580f6

    • SSDEEP

      196608:gXPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP/:g

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks