General

  • Target

    artifact.bin

  • Size

    12.5MB

  • Sample

    240916-yyqtyaxfkj

  • MD5

    412b77d817e242ec4cf2f5e1f319d301

  • SHA1

    e5b8e55949b33a4f85057a392c86489a7a5d3497

  • SHA256

    bda0e8f7a8383b0026382daad8c123dc726a35c07810ea8dea97b30e969a816d

  • SHA512

    6b92e0f2f3b951cee55ebf5625ff8579c3f92c257c7882039e38c5019ead7f84ed792d97a78fe133fbe582eb070c5ddd00fbfce430f46dd422fdde738adae244

  • SSDEEP

    3072:3BNmmPQhjS0HB3IdC3SXgqvfzzP+rTMGU5H8AH2RRRRRRRRRRRRRRRRRRRRRRRRP:R1PQh3HB4dCCXgQfwoF

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

defeatwax.ru

Targets

    • Target

      artifact.bin

    • Size

      12.5MB

    • MD5

      412b77d817e242ec4cf2f5e1f319d301

    • SHA1

      e5b8e55949b33a4f85057a392c86489a7a5d3497

    • SHA256

      bda0e8f7a8383b0026382daad8c123dc726a35c07810ea8dea97b30e969a816d

    • SHA512

      6b92e0f2f3b951cee55ebf5625ff8579c3f92c257c7882039e38c5019ead7f84ed792d97a78fe133fbe582eb070c5ddd00fbfce430f46dd422fdde738adae244

    • SSDEEP

      3072:3BNmmPQhjS0HB3IdC3SXgqvfzzP+rTMGU5H8AH2RRRRRRRRRRRRRRRRRRRRRRRRP:R1PQh3HB4dCCXgQfwoF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks