General

  • Target

    7d337cf7f54e13aa3d045336030074af0cdab304f1e781d611d086b3e7cfe438

  • Size

    238KB

  • Sample

    240907-w8llvs1apf

  • MD5

    54652c24cf369040689e46afeb083ee8

  • SHA1

    80b30eb64cb5e62af500b135f889c801f5468172

  • SHA256

    7d337cf7f54e13aa3d045336030074af0cdab304f1e781d611d086b3e7cfe438

  • SHA512

    cc568c8d3f7e0a21c1f4d3610832a1e8ec54e5256d0d478ab015ddbf5994a109850d82d849e8b47185ec8e358409492850ee1f181c728fa39ab2942a45bf4523

  • SSDEEP

    3072:S758AfWsgvZ6xR1wv7NMFYUSkxtDdAHvVkkLgpFCWs/xL/Q:ifWsgvZ6xR1G7NWzSkTDdtloF/Q

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      7d337cf7f54e13aa3d045336030074af0cdab304f1e781d611d086b3e7cfe438

    • Size

      238KB

    • MD5

      54652c24cf369040689e46afeb083ee8

    • SHA1

      80b30eb64cb5e62af500b135f889c801f5468172

    • SHA256

      7d337cf7f54e13aa3d045336030074af0cdab304f1e781d611d086b3e7cfe438

    • SHA512

      cc568c8d3f7e0a21c1f4d3610832a1e8ec54e5256d0d478ab015ddbf5994a109850d82d849e8b47185ec8e358409492850ee1f181c728fa39ab2942a45bf4523

    • SSDEEP

      3072:S758AfWsgvZ6xR1wv7NMFYUSkxtDdAHvVkkLgpFCWs/xL/Q:ifWsgvZ6xR1G7NWzSkTDdtloF/Q

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks