General

  • Target

    2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2.exe

  • Size

    423KB

  • Sample

    240904-bmzw5stcmd

  • MD5

    b2e864c2f8f6e243822a5c133bb41061

  • SHA1

    5571df4cdc5b65cdc315c95ee52344dda7f12b20

  • SHA256

    2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2

  • SHA512

    32a6087702abe92daab3e2c194b07006f5b9d3cdf48c692d23775f0d75e2941882920767148564ac7fedc417beadb1ae75734f240d07bec30eb262ae4f534e73

  • SSDEEP

    6144:qc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:q1OZDisvwdaxO0PuG1R4CWs

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2.exe

    • Size

      423KB

    • MD5

      b2e864c2f8f6e243822a5c133bb41061

    • SHA1

      5571df4cdc5b65cdc315c95ee52344dda7f12b20

    • SHA256

      2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2

    • SHA512

      32a6087702abe92daab3e2c194b07006f5b9d3cdf48c692d23775f0d75e2941882920767148564ac7fedc417beadb1ae75734f240d07bec30eb262ae4f534e73

    • SSDEEP

      6144:qc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:q1OZDisvwdaxO0PuG1R4CWs

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks