General

  • Target

    8b3014806b4e788228c201c7069d465a9b932b82fe9e10a829cd4fba2395fada

  • Size

    422KB

  • Sample

    240903-ycr5waweje

  • MD5

    fa518dd0a1bfbcd1a98f47ddce5db06c

  • SHA1

    5eacf7d80b50651aa3fbce275959836d4d56708c

  • SHA256

    8b3014806b4e788228c201c7069d465a9b932b82fe9e10a829cd4fba2395fada

  • SHA512

    4f5e07b16811911daed948eda40af0483ba49eff666f531499c78f72908da49cb95bc0b25ff1b222584e66e14a0deea2ce3774f5d1bd9a355b82a782b545477b

  • SSDEEP

    6144:damYSD4Mswaf3LUfkOHHXgTKAtVHIebIlPmxwl94b7:dLYSD4xj3L9OHZA3Iebqm6qb7

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      8b3014806b4e788228c201c7069d465a9b932b82fe9e10a829cd4fba2395fada

    • Size

      422KB

    • MD5

      fa518dd0a1bfbcd1a98f47ddce5db06c

    • SHA1

      5eacf7d80b50651aa3fbce275959836d4d56708c

    • SHA256

      8b3014806b4e788228c201c7069d465a9b932b82fe9e10a829cd4fba2395fada

    • SHA512

      4f5e07b16811911daed948eda40af0483ba49eff666f531499c78f72908da49cb95bc0b25ff1b222584e66e14a0deea2ce3774f5d1bd9a355b82a782b545477b

    • SSDEEP

      6144:damYSD4Mswaf3LUfkOHHXgTKAtVHIebIlPmxwl94b7:dLYSD4xj3L9OHZA3Iebqm6qb7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks