General

  • Target

    c97280c3f5a9f5624e77be287469eb85310b777391395da12d2e66737c98d877

  • Size

    213KB

  • Sample

    240906-l2ejvszhne

  • MD5

    ee271bdebc1bcd255611d9003a2833ae

  • SHA1

    fdd6de358c491b1cf26d3a3ec1eb83467a75661c

  • SHA256

    c97280c3f5a9f5624e77be287469eb85310b777391395da12d2e66737c98d877

  • SHA512

    f711a36e4fbf367094d77ac60bf9140a0bfc4d6b620541f4771d8c332066f5823538edc3ca6d09c140b930fafc891c85293c168e6ac9065b9dea814f2f0d5dd6

  • SSDEEP

    6144:taDXnqPnz53mEBAQTcoToM4v//MRb0Vdh1JQ:t6Xq/z53mz3M4vjVdz

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c97280c3f5a9f5624e77be287469eb85310b777391395da12d2e66737c98d877

    • Size

      213KB

    • MD5

      ee271bdebc1bcd255611d9003a2833ae

    • SHA1

      fdd6de358c491b1cf26d3a3ec1eb83467a75661c

    • SHA256

      c97280c3f5a9f5624e77be287469eb85310b777391395da12d2e66737c98d877

    • SHA512

      f711a36e4fbf367094d77ac60bf9140a0bfc4d6b620541f4771d8c332066f5823538edc3ca6d09c140b930fafc891c85293c168e6ac9065b9dea814f2f0d5dd6

    • SSDEEP

      6144:taDXnqPnz53mEBAQTcoToM4v//MRb0Vdh1JQ:t6Xq/z53mz3M4vjVdz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks