General

  • Target

    9e08c4e34c5358916c1f360f4c82efc4d7bd77d587cda899691a49c3dffb1bc6

  • Size

    213KB

  • Sample

    240906-gt7hfszfkp

  • MD5

    969450e69a3e85413b63c73abb733bdd

  • SHA1

    b506ca717ff22a749bf6e173a7d02b577564ce27

  • SHA256

    9e08c4e34c5358916c1f360f4c82efc4d7bd77d587cda899691a49c3dffb1bc6

  • SHA512

    8df1b276ff7f5cb67818ccc47158e3ba06f303e6da9aae1e0526c7537cb80d8a59e73e7aca80bd2cd0471a31a1dde49f7e96f05887ca66f9439b460ea3bda858

  • SSDEEP

    6144:PcDXnqPnz58kFjno63Fe/MMQm0Vdh1GQ:PsXq/z5V1nfFxjVdz

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      9e08c4e34c5358916c1f360f4c82efc4d7bd77d587cda899691a49c3dffb1bc6

    • Size

      213KB

    • MD5

      969450e69a3e85413b63c73abb733bdd

    • SHA1

      b506ca717ff22a749bf6e173a7d02b577564ce27

    • SHA256

      9e08c4e34c5358916c1f360f4c82efc4d7bd77d587cda899691a49c3dffb1bc6

    • SHA512

      8df1b276ff7f5cb67818ccc47158e3ba06f303e6da9aae1e0526c7537cb80d8a59e73e7aca80bd2cd0471a31a1dde49f7e96f05887ca66f9439b460ea3bda858

    • SSDEEP

      6144:PcDXnqPnz58kFjno63Fe/MMQm0Vdh1GQ:PsXq/z5V1nfFxjVdz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks