General

  • Target

    9622f580ee393bcb238cbbcdbf4752acac3ea2f538139352845952a4dea884f1

  • Size

    228KB

  • Sample

    240910-l7szfazend

  • MD5

    1a09089eb2bf1f7ac14b32335533b7af

  • SHA1

    7e08605a4e6d4b4ac6c5ec20ff5eba2884dd1db8

  • SHA256

    9622f580ee393bcb238cbbcdbf4752acac3ea2f538139352845952a4dea884f1

  • SHA512

    6202be3984d1dfd356f89921b4a62b2e91d7139627fe0da4e60f878e7fd17f6b35bd5e118464b25f0e4de4dd545825dbcbbcf24401853645d51665b37eaf9da3

  • SSDEEP

    3072:lN67vpI29VaPzK76NcNXLvoaedUE7nuQTdzZ/p43s64ctjm4f:lN67vpIKVozf0XLuuQTdJ2Nd

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      9622f580ee393bcb238cbbcdbf4752acac3ea2f538139352845952a4dea884f1

    • Size

      228KB

    • MD5

      1a09089eb2bf1f7ac14b32335533b7af

    • SHA1

      7e08605a4e6d4b4ac6c5ec20ff5eba2884dd1db8

    • SHA256

      9622f580ee393bcb238cbbcdbf4752acac3ea2f538139352845952a4dea884f1

    • SHA512

      6202be3984d1dfd356f89921b4a62b2e91d7139627fe0da4e60f878e7fd17f6b35bd5e118464b25f0e4de4dd545825dbcbbcf24401853645d51665b37eaf9da3

    • SSDEEP

      3072:lN67vpI29VaPzK76NcNXLvoaedUE7nuQTdzZ/p43s64ctjm4f:lN67vpIKVozf0XLuuQTdJ2Nd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks