General

  • Target

    00648d8195f97b68fb658c75f256f2b4.zip

  • Size

    1.1MB

  • Sample

    240831-syzh7a1drp

  • MD5

    495a86ff90134cfb1dc6e945c92253c6

  • SHA1

    21f63f13247a68a489130635936a73146f7c2f85

  • SHA256

    e489ae6a1b51341c25c741850c4f6e6f82d8241d618b5a082c248788df3ba759

  • SHA512

    74fbedfffbe0e7ae72c8920cb55cb976e7acfe053b0ee939ead0025751dd3cd25b2286de713a897fe7efd22cb9486961b4f6687ee97bc0ea4e3ae13e91a71e47

  • SSDEEP

    24576:Qgg351GYvnX4SZwfUm+TZJbODLy0HD7CT+X0rvCaLqUGPfvzSbB+rKr:OoYvnoSmfUm+Tjw1BICaf0SbB+rC

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      d572033c59d050ae0a7b6cafa3728a7675721bff18f4087fee4e8d8692c0a974

    • Size

      10.9MB

    • MD5

      00648d8195f97b68fb658c75f256f2b4

    • SHA1

      e45eb357905049dbfe81ad64a87fe4158392aeab

    • SHA256

      d572033c59d050ae0a7b6cafa3728a7675721bff18f4087fee4e8d8692c0a974

    • SHA512

      d70b12a153aa790925c134c638a522190930fc701d6cd45aff119a292d4657c4084fcafb424093d248421e26f2dd728526759e7f93a49147fdec937f7c86923d

    • SSDEEP

      196608:ITTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks