General

  • Target

    c8429917332f470b4e52c49d20490066a0c40381d6e60b732e82c50aa169405c

  • Size

    213KB

  • Sample

    240904-p31p9szfrl

  • MD5

    bbe557849887cec6ae81a416bad916e0

  • SHA1

    4a1d6ec85d604c1fbe96ad32ee94a7fbfdab797a

  • SHA256

    c8429917332f470b4e52c49d20490066a0c40381d6e60b732e82c50aa169405c

  • SHA512

    ed96746db7e2b12bc1ce9e9ec31ea75d19ccc67587b52aee9800a3123d437f6d97ddabb2a3f5b7a63ae4444fc59fb39d8a117fc3ade52cd77472f3c746415910

  • SSDEEP

    3072:lGCCafq9b79ZJ3k8e+sNPTRtr9sGVJx169blf49aTbQ:bfq9b79ZJ3kfPpsGZ8Pg9i

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c8429917332f470b4e52c49d20490066a0c40381d6e60b732e82c50aa169405c

    • Size

      213KB

    • MD5

      bbe557849887cec6ae81a416bad916e0

    • SHA1

      4a1d6ec85d604c1fbe96ad32ee94a7fbfdab797a

    • SHA256

      c8429917332f470b4e52c49d20490066a0c40381d6e60b732e82c50aa169405c

    • SHA512

      ed96746db7e2b12bc1ce9e9ec31ea75d19ccc67587b52aee9800a3123d437f6d97ddabb2a3f5b7a63ae4444fc59fb39d8a117fc3ade52cd77472f3c746415910

    • SSDEEP

      3072:lGCCafq9b79ZJ3k8e+sNPTRtr9sGVJx169blf49aTbQ:bfq9b79ZJ3kfPpsGZ8Pg9i

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks