General

  • Target

    a30fdfa60f93f1d21c6817b522b4c63b52bcd4d5d186c1ff89d843d6bbfb53b4

  • Size

    401KB

  • Sample

    240905-j5r81swdpk

  • MD5

    09622c398a7e6f315f566bc7cabfec89

  • SHA1

    c3ccda11c40b396615e5facefd3bf02d03d96c7b

  • SHA256

    a30fdfa60f93f1d21c6817b522b4c63b52bcd4d5d186c1ff89d843d6bbfb53b4

  • SHA512

    5a5cbe7e55df348c46d912158dd58d735c2a289122ac46da106ee41c21432f7eea6e49dee0f0a243112c050fc6aaa85a2bddbcef7a2abd3009dcfa319746102b

  • SSDEEP

    6144:x2tEWSHPfTo04jYUy85YbRE3TgVPEHmVR0p//dZgC87mw4iklA:xvWSHPfTo04jSGYVE3hG0p/lZDsg

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      a30fdfa60f93f1d21c6817b522b4c63b52bcd4d5d186c1ff89d843d6bbfb53b4

    • Size

      401KB

    • MD5

      09622c398a7e6f315f566bc7cabfec89

    • SHA1

      c3ccda11c40b396615e5facefd3bf02d03d96c7b

    • SHA256

      a30fdfa60f93f1d21c6817b522b4c63b52bcd4d5d186c1ff89d843d6bbfb53b4

    • SHA512

      5a5cbe7e55df348c46d912158dd58d735c2a289122ac46da106ee41c21432f7eea6e49dee0f0a243112c050fc6aaa85a2bddbcef7a2abd3009dcfa319746102b

    • SSDEEP

      6144:x2tEWSHPfTo04jYUy85YbRE3TgVPEHmVR0p//dZgC87mw4iklA:xvWSHPfTo04jSGYVE3hG0p/lZDsg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks