General

  • Target

    c9f9c516072359c5972d75337e89e790N

  • Size

    422KB

  • Sample

    240908-z6xswswbmq

  • MD5

    c9f9c516072359c5972d75337e89e790

  • SHA1

    00ac567dbe103901dc06e751802d937de1be9fff

  • SHA256

    49f08a77eedd5d5bf948d6c15688b04618296250793439928c9ba926bf758007

  • SHA512

    db56e058b456f85dcccf794d1cc9b0783b59f6f952e194aac013b4ad1b3d8116154d6be0b950a59a618bd30fd8ae0cd2b6f54e5e84628a4bf64f98106fbbc474

  • SSDEEP

    6144:4Cr9TDbMssgvbE5i8q2DNnWOFOMpoxAHg3s:4e9TDbxHba22F0xAHg

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c9f9c516072359c5972d75337e89e790N

    • Size

      422KB

    • MD5

      c9f9c516072359c5972d75337e89e790

    • SHA1

      00ac567dbe103901dc06e751802d937de1be9fff

    • SHA256

      49f08a77eedd5d5bf948d6c15688b04618296250793439928c9ba926bf758007

    • SHA512

      db56e058b456f85dcccf794d1cc9b0783b59f6f952e194aac013b4ad1b3d8116154d6be0b950a59a618bd30fd8ae0cd2b6f54e5e84628a4bf64f98106fbbc474

    • SSDEEP

      6144:4Cr9TDbMssgvbE5i8q2DNnWOFOMpoxAHg3s:4e9TDbxHba22F0xAHg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks