General

  • Target

    5b69fdf9a7a262ec979a01058970f3f8e8dfe4dbac0266554104da90716630db

  • Size

    3.8MB

  • Sample

    240905-bj74ca1dkg

  • MD5

    d7d4c59739da6a18ae7309621fa394d3

  • SHA1

    97caf87209e5dd84c74033542a20d24007b23ec8

  • SHA256

    5b69fdf9a7a262ec979a01058970f3f8e8dfe4dbac0266554104da90716630db

  • SHA512

    d162b00cfa9dbffcf1b5deb27de7820478a9d2681e543b4cf73ee25a4b2784b82ee2d79b22b099a58f00bad40c8520d0e00e6418bd04749b6669cb53d7e3f630

  • SSDEEP

    98304:G279KJBY/TCCDW/xt6KfXgl2DqvZjgU5iMlLp8SUvOU:GDXwmpn6cXglGcjLVL5M

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825.exe

    • Size

      10.5MB

    • MD5

      274d0ab4368246be7f22990d9d5cb4cf

    • SHA1

      d34547e852863893aef034effc726bf2ee227d02

    • SHA256

      21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825

    • SHA512

      dab676f30f08c6719e26cc376c89803a14d89adf50c6ee31d941f724b3dae03ca1cce950a3dd7651e3ed5f40323b021c875cdd1dfbbba9952cd417d7a3f90e81

    • SSDEEP

      6144:Sc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:S1OZDisvwdaxO0PuG1R4CWs

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks