General

  • Target

    fc8b39e1550508fc277adb212c06b4d858eec204fe9157947fcd8db28296a1d4

  • Size

    9.9MB

  • Sample

    240906-3wcazsvaje

  • MD5

    e81b146b59e15eac54134447700222a8

  • SHA1

    5bedbe1b9f0e3f145784f01e607b77ffa5c62403

  • SHA256

    fc8b39e1550508fc277adb212c06b4d858eec204fe9157947fcd8db28296a1d4

  • SHA512

    32c4513d02df5dca9069381473bc11d161bff78210868bf5cd629eda4b58a83a66f0f9d7b71f7a4077322372474a0a5035ac40121b673eaf18750ee6fa0a8272

  • SSDEEP

    196608:hBvQ42JxvG4YULhzKrQqxdiY4N7F7xWGoiMUA1er41IvxRSytJqdQ3oY3B2:mJxoUVzKklRF7IGEUA1eUQnJQQ3oYR2

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda

    • Size

      14.6MB

    • MD5

      e22e7c6baeebd701b760f4a27a02d8c4

    • SHA1

      1b924330a134a074ecb6f59affde76d6989100c0

    • SHA256

      8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda

    • SHA512

      aa15560cb2fee8ae0c07acc6403f1ec9f33dc63cd6965d5e8af2f645970bb3c0fb7cec48646ddcaaa0fbef010bcdbc0468ea5c78658ea25994d1e1cd80e904e4

    • SSDEEP

      98304:SC+PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:x

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks