General

  • Target

    743e88ce351815e356e3605246222b8076c5ea5e79bc0a9c5304504a67818ac8

  • Size

    424KB

  • Sample

    240905-fd2ftsthpe

  • MD5

    f50413dcad54999b078491cda8cc97eb

  • SHA1

    b9757f71c4c63cdfdcd4b4e7e81343d2140fb97b

  • SHA256

    743e88ce351815e356e3605246222b8076c5ea5e79bc0a9c5304504a67818ac8

  • SHA512

    2ea5bd66f9365d7dfd14fe1a03234e02c17353e0f8d94316d7c15bb533444e68132f3de3b48ca366d147f0a21d4665730f00c9ae5d6981330680f9d31b03e74a

  • SSDEEP

    6144:xb7/BJsZfVjljXIJLprKi7Skl1QoRXZYsoS7ZD17T4kXwA:xXBJsZfVjlrgLND7SG1QyvH7T4k

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      743e88ce351815e356e3605246222b8076c5ea5e79bc0a9c5304504a67818ac8

    • Size

      424KB

    • MD5

      f50413dcad54999b078491cda8cc97eb

    • SHA1

      b9757f71c4c63cdfdcd4b4e7e81343d2140fb97b

    • SHA256

      743e88ce351815e356e3605246222b8076c5ea5e79bc0a9c5304504a67818ac8

    • SHA512

      2ea5bd66f9365d7dfd14fe1a03234e02c17353e0f8d94316d7c15bb533444e68132f3de3b48ca366d147f0a21d4665730f00c9ae5d6981330680f9d31b03e74a

    • SSDEEP

      6144:xb7/BJsZfVjljXIJLprKi7Skl1QoRXZYsoS7ZD17T4kXwA:xXBJsZfVjlrgLND7SG1QyvH7T4k

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks