General

  • Target

    d5765dff5690f5f9a337c9fa0047b8c58e9f2ec2b6211f8482d57c5bf251308c

  • Size

    7.8MB

  • Sample

    240902-d7t8ha1grd

  • MD5

    bb7fc0972dc54c71ba4fa058194290d8

  • SHA1

    0618385f3aedcfd2818aef5c07e5dbc995192910

  • SHA256

    d5765dff5690f5f9a337c9fa0047b8c58e9f2ec2b6211f8482d57c5bf251308c

  • SHA512

    a954f0034dfffde83c86fed5cf7c32ed74017b685ceedae45c209eee61bc0508ad7ec8f62df5f5664b26b36760658540b1287dd4169aeb6c96e9429c5b65222d

  • SSDEEP

    196608:bcpJ5Ohc+qCVmZjhPLoXY0eJY0h3SDUawhZSl:Qp4c+qCghP8Xdf0h3SlwhZQ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      23f1145599ca4f2836be5ba2ef445c06709df2e71dc30d6cd534b60810673716

    • Size

      11.3MB

    • MD5

      d318dc7b92c68cddb6ac8e82af8a7439

    • SHA1

      c6fd11ca5e592b4992663d210b0c622e47c6697c

    • SHA256

      23f1145599ca4f2836be5ba2ef445c06709df2e71dc30d6cd534b60810673716

    • SHA512

      e44a44fe52d6017ef83aa569ca6c0277e0c8dd09f255e3b68fbbc032703ce8deee7f40c887abfe3feac291e63baa62e04098ad43ab15e2df3476cc731995c945

    • SSDEEP

      98304:9EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEU:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks