General

  • Target

    3570b0f48378f2648f14f04bfc148ec0N

  • Size

    191KB

  • Sample

    240910-ct2jzstfre

  • MD5

    3570b0f48378f2648f14f04bfc148ec0

  • SHA1

    bccd7d4cb74cc45746aab0ea4f1e4909431b07e2

  • SHA256

    580374ec67e09e658a8094b35111a37d8e395c4d9893bc62f4b12de1f911eeb4

  • SHA512

    5ff75b6d99603318f3f5456c947bf6018d452ffb4f136453da8a71bb2443a3128d8dd0ba3ccdbee162b880761e7aee9db74feb908df0bd9c21aa419f57524410

  • SSDEEP

    1536:vwnZKshTFploXRY9PmoUAiZRuETzmsropBAaGCzP9HKglyI0q3uyPW5tZZT9HLaG:Kbba/PZRVesLG0g0kuyu5tXg7gq/

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      3570b0f48378f2648f14f04bfc148ec0N

    • Size

      191KB

    • MD5

      3570b0f48378f2648f14f04bfc148ec0

    • SHA1

      bccd7d4cb74cc45746aab0ea4f1e4909431b07e2

    • SHA256

      580374ec67e09e658a8094b35111a37d8e395c4d9893bc62f4b12de1f911eeb4

    • SHA512

      5ff75b6d99603318f3f5456c947bf6018d452ffb4f136453da8a71bb2443a3128d8dd0ba3ccdbee162b880761e7aee9db74feb908df0bd9c21aa419f57524410

    • SSDEEP

      1536:vwnZKshTFploXRY9PmoUAiZRuETzmsropBAaGCzP9HKglyI0q3uyPW5tZZT9HLaG:Kbba/PZRVesLG0g0kuyu5tXg7gq/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks