General

  • Target

    92017ee762ffecb801be76e272ef66b5.zip

  • Size

    189KB

  • Sample

    240901-rlm4ystcqc

  • MD5

    9968743cc471ef4852c1ac7c973f0538

  • SHA1

    5cf11a7fa58283cda988dc524412abff409d9263

  • SHA256

    e02a3d35c6708e86e89fc7d06f2f41219cfb7dca206276481a41adc4f0157bb6

  • SHA512

    be6be5420448736799eb3cf47a05a8c6b29f0cc22c53587db641c463fd96cd71b63c515bacdddb3968748ac1bb2b01cf461388882a139074852afa656358e898

  • SSDEEP

    3072:Wx/Ilyu0+dQNGHSGEyUca+SgeiGmyw/RGXD/EPoTaCpXGHcKvm:Wx/TL+pSGCIWmhQYQTn2Pvm

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      b93a47f6924dbe4309eb656760e3edeafdd38061e8ef9add06598f95871260b6

    • Size

      12.9MB

    • MD5

      92017ee762ffecb801be76e272ef66b5

    • SHA1

      0171f93700ce9e398725ad857e7384031581846e

    • SHA256

      b93a47f6924dbe4309eb656760e3edeafdd38061e8ef9add06598f95871260b6

    • SHA512

      1701ed30435153b4b765775aeb68dd1e0751ef2cbc14e7016bcda1933060d881fdeb0a9145e527e29a98bcd3caec23433563d6af73babd3ce33c13242d258d75

    • SSDEEP

      12288:BZwvqm0loTlEUKg7/ua4FXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:BSvqmNB/d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks