General

  • Target

    264492f5a3848a5b5939368dceb63ed0N

  • Size

    387KB

  • Sample

    240914-we1tpaxcqe

  • MD5

    264492f5a3848a5b5939368dceb63ed0

  • SHA1

    56f0394d689bd0a160b6be8a6554ffe050ff0353

  • SHA256

    9e63a0b8cee81a6872621af7656f617a6c31bb1dedb7647e45bfc36ad8b4fcac

  • SHA512

    ed8e223616670492216e9e336eff69297fb267c39e5dc87f7827d61a67263101aab0ff0d8ecc1f7ed1981cc3397b901690c020d6bc1a6e1a86ff312a7db78e85

  • SSDEEP

    6144:7B0321qBdyJvSHPSzvU6G4o77ll0rRcQZLGpxBY2dUWnvjV4pzf:76m4BdyUb6/oPjUmAQxB3dJJi

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      264492f5a3848a5b5939368dceb63ed0N

    • Size

      387KB

    • MD5

      264492f5a3848a5b5939368dceb63ed0

    • SHA1

      56f0394d689bd0a160b6be8a6554ffe050ff0353

    • SHA256

      9e63a0b8cee81a6872621af7656f617a6c31bb1dedb7647e45bfc36ad8b4fcac

    • SHA512

      ed8e223616670492216e9e336eff69297fb267c39e5dc87f7827d61a67263101aab0ff0d8ecc1f7ed1981cc3397b901690c020d6bc1a6e1a86ff312a7db78e85

    • SSDEEP

      6144:7B0321qBdyJvSHPSzvU6G4o77ll0rRcQZLGpxBY2dUWnvjV4pzf:76m4BdyUb6/oPjUmAQxB3dJJi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks