General

  • Target

    8976781b9e1d6f794b30de6a350d5d4c.zip

  • Size

    163KB

  • Sample

    240903-d2yzhawckn

  • MD5

    c3d807773999eb2261e4c1ef4c140d68

  • SHA1

    667aea339584ed8cc6de09dabb8142dc54678eaa

  • SHA256

    dbf34555e73b3fc324dce63b0c7dcedfe1b2a243f122d04eaa6d67bcfef30f91

  • SHA512

    d83c20681eabac06c5b876ce172c0f3750fb4e65fd995625eb4996d03060330ac035c996f7bba3f354e5634b195f3af0aca66cfa9b3c7a8fd0def1a854480ddb

  • SSDEEP

    3072:4M2WBzNXpAYfGoSNdzcDcncoAxJKhkJ18iu/Loy8JVSZz7qXCL0lB/m3+lELRw9P:qWXZAYfNSjwUc8kz8C3J8Zz7fLUsjLah

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      e3dd0a078e3b5f532c6b5b3254eea71e4afac1eda00d349d6fc5582d2c3487e8

    • Size

      12.2MB

    • MD5

      8976781b9e1d6f794b30de6a350d5d4c

    • SHA1

      3a1c95ac27d57dbc147ffda590c9e6645a402619

    • SHA256

      e3dd0a078e3b5f532c6b5b3254eea71e4afac1eda00d349d6fc5582d2c3487e8

    • SHA512

      f98d91c0b7c1f2fe4bf777a7e850453710c5dd0129daa8b5bd2e94c689cf597424b2d87201068d73534dc794ffd145540888dfa84b9ac67b9a8c354b1c0be5b8

    • SSDEEP

      12288:MQ50bBoofipGZdIjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjH:MQTooy

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks