General

  • Target

    a5462ebc51b4e3cee8e57ff06c11fae6a86029c95a8975fc5d4b8efc8f1f39dd

  • Size

    130KB

  • Sample

    240906-w4ebzssale

  • MD5

    2c61acab9839a77abeeb60700547bae2

  • SHA1

    cfe4cdde3818f2fe56cfb7e957d38eca62857b01

  • SHA256

    a5462ebc51b4e3cee8e57ff06c11fae6a86029c95a8975fc5d4b8efc8f1f39dd

  • SHA512

    e639cfaf19bf319c9e2f4a1dde25aff1c2e43bcbc76dbb1f8936d90ad9e9add2b1e821824b06fc63ef75d1ab647cf3487cf02c57284f06819fa3c00acc6d757b

  • SSDEEP

    3072:lqARehLq8F9zaepUAXatF8fsPwZtryr23IOWNgOrCTLuN+t7q3vGEw6vl9:lZRQm8FBNXatmfsPwZtryC3JzqNB+Ewa

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c55859f35ad07e3e4b13f45fa5fa4c788f7059daac930ea435600a936104c1b5.exe

    • Size

      213KB

    • MD5

      8e456f932787fcd0cadbb598174575b2

    • SHA1

      22b069c76b86bdb6be8cdafc78019b55c583062e

    • SHA256

      c55859f35ad07e3e4b13f45fa5fa4c788f7059daac930ea435600a936104c1b5

    • SHA512

      cb26a33dacdcfe804bdd587ecd44b9bf1c59f357e8701fc4f5e1b04d8d8882466c7743fac51969fe8912e1197a5653986eb4a71edc35eee89051b6c98d546c9d

    • SSDEEP

      6144:MGDLD6Tj3Vyg0mwiRjaVlodEFjvn/Mq0Vdh1HQ:M+L2n3VygtzRWJjv+Vdz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks