General

  • Target

    88af0d7e54ecf3a4221e4f44c350201023ac0180de913bbf4181510cfdf4bf79

  • Size

    400KB

  • Sample

    240905-xzl2psxfjr

  • MD5

    41f6a8fcf7ada67b4f86dd5b64ecd5ae

  • SHA1

    658b41e1c70bc0a635f4a73ab3453abf31a6d9cb

  • SHA256

    88af0d7e54ecf3a4221e4f44c350201023ac0180de913bbf4181510cfdf4bf79

  • SHA512

    cf374f2ae1b399ab0597408b1639cde605f5938159744367b56dd9341049ab670b7264834ab253b398e0b9f12cf847f6888a280d596702796bfb14bfacc0cffa

  • SSDEEP

    6144:GHZdHdf9ev0BE64vu05ADX9AIw5IHK7ZlPoCofSJw:GHZdHdfsv0B6MqZlPoCo

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      88af0d7e54ecf3a4221e4f44c350201023ac0180de913bbf4181510cfdf4bf79

    • Size

      400KB

    • MD5

      41f6a8fcf7ada67b4f86dd5b64ecd5ae

    • SHA1

      658b41e1c70bc0a635f4a73ab3453abf31a6d9cb

    • SHA256

      88af0d7e54ecf3a4221e4f44c350201023ac0180de913bbf4181510cfdf4bf79

    • SHA512

      cf374f2ae1b399ab0597408b1639cde605f5938159744367b56dd9341049ab670b7264834ab253b398e0b9f12cf847f6888a280d596702796bfb14bfacc0cffa

    • SSDEEP

      6144:GHZdHdf9ev0BE64vu05ADX9AIw5IHK7ZlPoCofSJw:GHZdHdfsv0B6MqZlPoCo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks