General

  • Target

    a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02

  • Size

    190KB

  • Sample

    240904-r7a2hssdln

  • MD5

    62947f28aedffbba7b8424fa764d33ac

  • SHA1

    baca398418a7e83b07ae924694897428660f936a

  • SHA256

    a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02

  • SHA512

    5be7ecc2c6ec5056cc9db02fb0e8f694154a55bafa96f2943ead5c2b0730ddbcb82739ea6b2769fb93fee62bc15a9b2bc30de24d90dcc40cc64be6186f2b9279

  • SSDEEP

    3072:aH+lBBpz9/vh9yx37T/xvyNvypa7spopsUyqpr3xFbQ:nBpz9/vh9yxrbxvyN/pdJtz

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02

    • Size

      190KB

    • MD5

      62947f28aedffbba7b8424fa764d33ac

    • SHA1

      baca398418a7e83b07ae924694897428660f936a

    • SHA256

      a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02

    • SHA512

      5be7ecc2c6ec5056cc9db02fb0e8f694154a55bafa96f2943ead5c2b0730ddbcb82739ea6b2769fb93fee62bc15a9b2bc30de24d90dcc40cc64be6186f2b9279

    • SSDEEP

      3072:aH+lBBpz9/vh9yx37T/xvyNvypa7spopsUyqpr3xFbQ:nBpz9/vh9yxrbxvyN/pdJtz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks