General

  • Target

    ae30f8849f76c8517dbb9922a570efd8b2a502292df7f768bfdeebab92aa52ba

  • Size

    71KB

  • Sample

    240908-bnwk4sydng

  • MD5

    26ebbf2fff571c90b3af42785d65db3a

  • SHA1

    20ddf85b7a5d92dd7e41fd22237556460f56e98b

  • SHA256

    ae30f8849f76c8517dbb9922a570efd8b2a502292df7f768bfdeebab92aa52ba

  • SHA512

    71b444041b967a33a89cf6c31090e86045f5f683dc577d1eae2696cbdae569e70a061968c1f9ba36d9515be14e2369020c74a2ea2ed2798a77778dfc06c050d9

  • SSDEEP

    1536:Dkes21VCy1nTxSYg3CXTjFWL9SdpIHUc:DDVCyFxSYACXF/pI0

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      ae30f8849f76c8517dbb9922a570efd8b2a502292df7f768bfdeebab92aa52ba

    • Size

      71KB

    • MD5

      26ebbf2fff571c90b3af42785d65db3a

    • SHA1

      20ddf85b7a5d92dd7e41fd22237556460f56e98b

    • SHA256

      ae30f8849f76c8517dbb9922a570efd8b2a502292df7f768bfdeebab92aa52ba

    • SHA512

      71b444041b967a33a89cf6c31090e86045f5f683dc577d1eae2696cbdae569e70a061968c1f9ba36d9515be14e2369020c74a2ea2ed2798a77778dfc06c050d9

    • SSDEEP

      1536:Dkes21VCy1nTxSYg3CXTjFWL9SdpIHUc:DDVCyFxSYACXF/pI0

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks