General

  • Target

    873d61d252596ef91e699d9c5a641119.zip

  • Size

    1.1MB

  • Sample

    240906-29vttashlh

  • MD5

    53e96f100b2104db8d6a2e7e4e6a3cdc

  • SHA1

    faef32f77fa1ef84aea99ebe80303ea88e3803fc

  • SHA256

    337df24a0a893ff8c2930d5ccf98713a8fc0c28e4563115b8cf7abf875be3403

  • SHA512

    57b2e872786f050c79ae76e2cce5dc28044a4d2ce49c20cd8c8c19f3a3334448e02a9b8360459967f1609116e84b7e144a5b70470009b2ee9f00c1f91ff65600

  • SSDEEP

    12288:3yCQdm5Th9FCsGOCMUJRbUDZOIGrww9vn9HpJXxn2Ul/tBiY0sJ8DuKimeYyzaHK:7QIi/yUrj9vnVXXd8EmeY0a5wLQAsx8

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      6ee402c592b8d9a8f65b1e9871916bf8bf08118253758af2bd8d02b053b3af20

    • Size

      12.1MB

    • MD5

      873d61d252596ef91e699d9c5a641119

    • SHA1

      fac32b3b99469b90641d7916d7681fef16d392c4

    • SHA256

      6ee402c592b8d9a8f65b1e9871916bf8bf08118253758af2bd8d02b053b3af20

    • SHA512

      66d54af51f53b35f5a6f2527da45a5a1e59b22768f3aed12631f23c61293a410c9cf08f8a5c848c9884ea418935584e47a37574659c71a4ec6441afed52b7325

    • SSDEEP

      6144:Y1eOABi9y39q2xwt8hW5B3rmKYXIOk43AnscO:Y1PEik39bwtMGd6KK33Y

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks