General

  • Target

    3a9ef0bc05952c74715b6585f97c41f6.zip

  • Size

    189KB

  • Sample

    240903-1fx7eaxfnk

  • MD5

    732a2a773096079d324538038e0fc312

  • SHA1

    79f353009924dcc291f3c2f37980679a0a1e5cca

  • SHA256

    1e626285cd59cd6ebb05ad1113a8de552c897806b66ded1c3b98010114cd6313

  • SHA512

    b44399f0bb044fbad3ef5cd6e7f1b7f7e7abb459bec86ed3e8dd3e65c59235932c5e0fcfd20ad9e374b5cad14627502fd8be7673df3d7722f651ae6c733361a1

  • SSDEEP

    3072:DmM6Wo7luXI5+drIIaqnBFhAfG0mXV1oHh4ly7dOEQUM5PhZrTUuupBF/0q0YZyF:x+7luXI5+dcXqBvAfOV6h47EQUM5Dmpi

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      97d23550ec191ff048c89ae23e9ef5ae009ff65d79e2f286029ac90331bc90ba

    • Size

      281KB

    • MD5

      3a9ef0bc05952c74715b6585f97c41f6

    • SHA1

      877fa1694843c5bf3f5124e8b17ead26bc211c13

    • SHA256

      97d23550ec191ff048c89ae23e9ef5ae009ff65d79e2f286029ac90331bc90ba

    • SHA512

      2d67f3d29359ff2cdd058f6526e22604cf69f7126f09a0006fa8a34a90db0ac6d895cd78b5e570789d79584101add9e5ac732473d7e4cca5a9b8fee2262c2034

    • SSDEEP

      6144:YTCpFumdDpw7jmzwdJ+nY6eYqX7tNfVXVHQLIiu8cfo0/pW:YTkFugpn2UxwZGEX8cA0/M

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks