General

  • Target

    c4c9428ea6a30325f8ac6a3fecc199a1.zip

  • Size

    180KB

  • Sample

    240901-qzw4casfjc

  • MD5

    4127829c259610b80c10aabd0ceb04d4

  • SHA1

    a431686ca42aa314cdceafb059e3989d1a316617

  • SHA256

    65355c0a686d8ba5f7551152571545331d64fe207a4f6c44ae67b240f3cbb19c

  • SHA512

    c7d8ec1f13d1d62c892ae2db5b7b8befc0e30f1bb73ce7bf22f1a7b5d376e7937f2a28838cddc69b759c1edab62266b498e187090050042f1b97ff94255407df

  • SSDEEP

    3072:pRrjzAtl2NZQxPoyaCDpqjyrUKE7hwQBUec4HzDGi9UleibJFAR1rg9zgAQYPXKl:b+V75pqnK+hwJlC8eibDU1rU/PayBoqA

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      4fb9ec0883d7b509a16d73e2181f5236d13042706cb8bbe82091f8a9db4575d1

    • Size

      12.5MB

    • MD5

      c4c9428ea6a30325f8ac6a3fecc199a1

    • SHA1

      e8c27d01e8e1b4f11f6183e8ba4b3065392349ce

    • SHA256

      4fb9ec0883d7b509a16d73e2181f5236d13042706cb8bbe82091f8a9db4575d1

    • SHA512

      b052061f5936ee2f30fc18e81daa9542451a1ad58235bd180e7d01fa49977813945492890a1a37a3cec59bb261a626cd175f12ac85bec9e000273159980e7a33

    • SSDEEP

      196608:TPRMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMP:T

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks