General

  • Target

    537afa11519e38a93a1270a859040f804ab2c894d451d58d80c7e497b78549fe

  • Size

    400KB

  • Sample

    240905-wvp25axdnb

  • MD5

    56bcd07602b26cd5c6224dd22bb26b7c

  • SHA1

    c7bd8d8c02a310beaf6abd1c58edaa9d02b5f2a2

  • SHA256

    537afa11519e38a93a1270a859040f804ab2c894d451d58d80c7e497b78549fe

  • SHA512

    a3eb4d77155f9d9533e7969ea737c537776e108e7d943269d21fcc6dc63a58e46d13135549c659d86a6de9123f8add18c49beee14c470b7c57ef3646bef57b7b

  • SSDEEP

    6144:mPAbuY32ftPCe4n79+JtUKzBqddIs00jUS0l/g5VfcA:mcuY32ftPCb79KAUs00j10lWVf

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      537afa11519e38a93a1270a859040f804ab2c894d451d58d80c7e497b78549fe

    • Size

      400KB

    • MD5

      56bcd07602b26cd5c6224dd22bb26b7c

    • SHA1

      c7bd8d8c02a310beaf6abd1c58edaa9d02b5f2a2

    • SHA256

      537afa11519e38a93a1270a859040f804ab2c894d451d58d80c7e497b78549fe

    • SHA512

      a3eb4d77155f9d9533e7969ea737c537776e108e7d943269d21fcc6dc63a58e46d13135549c659d86a6de9123f8add18c49beee14c470b7c57ef3646bef57b7b

    • SSDEEP

      6144:mPAbuY32ftPCe4n79+JtUKzBqddIs00jUS0l/g5VfcA:mcuY32ftPCb79KAUs00j10lWVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks