General

  • Target

    3482cbbb23d7548633dde35f128ea40a.bin

  • Size

    4.1MB

  • Sample

    240905-lgkkdaxcpj

  • MD5

    6dfaf3ad1e5bb9cea034d75492db55ca

  • SHA1

    408b0f07a7bb0894ac93919d0f24db5d50cc4d44

  • SHA256

    3ee48e396b8187d81d1c9c3bfa6f42fa82683c65cc6e9ff0123a30461f285c18

  • SHA512

    08abf3cb4631d37f572d50ba08b2a98e7b54e9a9f9a61ae2d5de0da22140477b54fa694e30b295d2345aefcb85bcd540d18e7278f1429b1ee49029f32241fe9c

  • SSDEEP

    98304:gRtTHOFVWc+wX7yOmitu9Np0DKYvsXwZZ:sNOLB+w2OZOp0B5Z

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      8777baf9f5a68be1faf17fa6f7c5ab3de0113392784cc150b822b7db5426e380.exe

    • Size

      11.2MB

    • MD5

      3482cbbb23d7548633dde35f128ea40a

    • SHA1

      b8cba7389b8e195b30ceb2e1a2b1d1fd6129adbd

    • SHA256

      8777baf9f5a68be1faf17fa6f7c5ab3de0113392784cc150b822b7db5426e380

    • SHA512

      db334c6aae52045ff3ce7597f172cce21f5a3a61a85b8dd4c5517eac649b60e429df968e1538c99080449d0ebfb5d8e917cb43bfa105e27d0a790ca2463748c7

    • SSDEEP

      6144:Oc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:O1OZDisvwdaxO0PuG1R4CWs

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks