General

  • Target

    ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5

  • Size

    400KB

  • Sample

    240905-y4vp3szamh

  • MD5

    aa92bc82a2b3c733b305eef3ccb7ae6e

  • SHA1

    b52729db10f5c62ea03f4280e16cbd5304487bcb

  • SHA256

    ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5

  • SHA512

    de5d0741196ae12200d35736dc37f7d7fb809e63378ba5b0b8f0da962c608037f2e9ff6b35a371fd0a0d7182da86f3338697c47fbd246a0c1831a14edbead8b3

  • SSDEEP

    6144:ctBJHpf5eNmB7EEE+zwN6mdDHRIdJCBODBhMJWlN6w:ctBJHpfANmhrmdadJ5kO

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5

    • Size

      400KB

    • MD5

      aa92bc82a2b3c733b305eef3ccb7ae6e

    • SHA1

      b52729db10f5c62ea03f4280e16cbd5304487bcb

    • SHA256

      ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5

    • SHA512

      de5d0741196ae12200d35736dc37f7d7fb809e63378ba5b0b8f0da962c608037f2e9ff6b35a371fd0a0d7182da86f3338697c47fbd246a0c1831a14edbead8b3

    • SSDEEP

      6144:ctBJHpf5eNmB7EEE+zwN6mdDHRIdJCBODBhMJWlN6w:ctBJHpfANmhrmdadJ5kO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks