General

  • Target

    026f086162e7d6d864ca4dc744149bc0.zip

  • Size

    214KB

  • Sample

    240901-a9yrxsvhjj

  • MD5

    93a3fbf1676c87499f53333963e1f40f

  • SHA1

    72d5b051c240df44ae6ff3f326f955dcb213ca24

  • SHA256

    0479dd4c50da096ebc1143c05d2f1880ffa2138686430736f078c59c46252e0d

  • SHA512

    0910115ca0341707fa2f27e7f7e1c59240096f9927198c586a86185a99a8a7abe2d6089d3d9c26eb932f2a48407e9f63b72f2727a8de170b9fad5e45c089831e

  • SSDEEP

    6144:igFTqBPka/cUWBsI5MR7Si4D/YXTHsNPvigg:FTWF/t6sIU7SBYXTHsZtg

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      3ef291e4dc9f5a6e42ae653acae1e014e90bf658c4160f6e8de7f2e4b0538460

    • Size

      10.5MB

    • MD5

      026f086162e7d6d864ca4dc744149bc0

    • SHA1

      cc81af6e0d8bd8c89126f509ccb5714cce8a3ef0

    • SHA256

      3ef291e4dc9f5a6e42ae653acae1e014e90bf658c4160f6e8de7f2e4b0538460

    • SHA512

      ff7ba4526233eb5a7e6dfa4673bfe0dc9b354a9960c23822267cab62c1571139e93c3919d8bf38bd1afd58b147ea15a2fdc1ad6b92f2e0fd2e65b14847cdebf4

    • SSDEEP

      49152:DkHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks