General

  • Target

    2ceb7d489e52c22b3400be1033d415d48f46548940e9519bf23ce3053d8a0a07

  • Size

    399KB

  • Sample

    240905-tjtj3athmm

  • MD5

    0739f44be0a711a02242bd37e1794796

  • SHA1

    7bc1505e740bc2f926cd72ab55615b9dc070ac5b

  • SHA256

    2ceb7d489e52c22b3400be1033d415d48f46548940e9519bf23ce3053d8a0a07

  • SHA512

    f23776894833937c752c161033295450f5a0b7a01f4454e4e96bac05a09193b2a2facb0287f5f7ff8dd1bd49e7f8172311b8401cb9b1986aafb73c9730f337b0

  • SSDEEP

    6144:f89I3KfShUDe2hAI+WBO5sIBdwWBCA+HO3njSRw:f89I3KfShUDMIRBSCLHO+

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      2ceb7d489e52c22b3400be1033d415d48f46548940e9519bf23ce3053d8a0a07

    • Size

      399KB

    • MD5

      0739f44be0a711a02242bd37e1794796

    • SHA1

      7bc1505e740bc2f926cd72ab55615b9dc070ac5b

    • SHA256

      2ceb7d489e52c22b3400be1033d415d48f46548940e9519bf23ce3053d8a0a07

    • SHA512

      f23776894833937c752c161033295450f5a0b7a01f4454e4e96bac05a09193b2a2facb0287f5f7ff8dd1bd49e7f8172311b8401cb9b1986aafb73c9730f337b0

    • SSDEEP

      6144:f89I3KfShUDe2hAI+WBO5sIBdwWBCA+HO3njSRw:f89I3KfShUDMIRBSCLHO+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks