General

  • Target

    432b30b5933807917637c529dd1fe29d46f534b8e3cc922f54ca1fd5af6686db

  • Size

    241KB

  • Sample

    240905-lrlkesydmb

  • MD5

    bc7d571e3ada1012e4cb6a6e25621719

  • SHA1

    d264afa744759111db811aa6dd052ef82107733e

  • SHA256

    432b30b5933807917637c529dd1fe29d46f534b8e3cc922f54ca1fd5af6686db

  • SHA512

    e39de3b95a5ec64457585c37474ac9db40e17b0f1deebe40ca7fa2547867406fc6604bb6eb5a2788c0d9b45d3c296830514fadb16a3b4acd155990fae53e9c27

  • SSDEEP

    6144:uTcjSxxfypgSCIl82mbQvzpIh5D3G5V3CBWY:uCSxxfUi2QCzKLG73CMY

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2.exe

    • Size

      423KB

    • MD5

      b2e864c2f8f6e243822a5c133bb41061

    • SHA1

      5571df4cdc5b65cdc315c95ee52344dda7f12b20

    • SHA256

      2cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2

    • SHA512

      32a6087702abe92daab3e2c194b07006f5b9d3cdf48c692d23775f0d75e2941882920767148564ac7fedc417beadb1ae75734f240d07bec30eb262ae4f534e73

    • SSDEEP

      6144:qc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:q1OZDisvwdaxO0PuG1R4CWs

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks