General

  • Target

    f5a99263467440a04da884e37b581577.zip

  • Size

    184KB

  • Sample

    240903-vdhq2sserb

  • MD5

    bf58e3393014472ce0dacd3033757992

  • SHA1

    0a423e33ee064b3d18b9a6e5686b975ff2ffc26d

  • SHA256

    e0a91168ad71c71e4bacc7b7755b41cc2f165adbd4c0c5166df8f7fb2650ad0e

  • SHA512

    c30895a24c3ce4be566f5fb248c565260d340ce4a0bc1d2dae22506e31341f31b1db3080bb67c09f4502586ac9c4f61d25c963810c2ce79d74f374b3fc2b8a25

  • SSDEEP

    3072:560w27YGUtMFcxrZMaB3JDw1goQi3MKSbKzb1p2EhjJnluJLmxATvjEsKxc0TM:562mhOaB3JDwqoXMK8uRsEhJrcw5xcv

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      bc51cad0a8ed5eb57551f034a5f693b4d1c135201a38ff4b3d7c1eb6151745c2

    • Size

      14.2MB

    • MD5

      f5a99263467440a04da884e37b581577

    • SHA1

      58c016d9dae50898c03dc602997db96b14fbc2fe

    • SHA256

      bc51cad0a8ed5eb57551f034a5f693b4d1c135201a38ff4b3d7c1eb6151745c2

    • SHA512

      b5255af60ca12756011398e5907ef6587cd9ea77401b55b30c0812c2c616ab492eff9d2bba6c5a7ba7732e2f4f0eba80d702bb0d98e767499d182219e16f45af

    • SSDEEP

      196608:H4TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTH:H

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks