General

  • Target

    keulompy.exe

  • Size

    13.0MB

  • Sample

    240917-mqjj4sycpf

  • MD5

    2303196f2416629f0fe3ea16d6eb89c0

  • SHA1

    5d37ba77ce2839d3875876a2f61b3782e7d81ebb

  • SHA256

    51ac9e66490d43f06ad67e19e241b2a45489c558bc75a35f2d3403bfdc3adef4

  • SHA512

    02cbf4613104265bc8f07bb7337d4a60163e41344ca2e64b139c148d42b6711bea669305cdb6123625c4460ddcf41120650fbe3d393c618cf2766494d2a92894

  • SSDEEP

    6144:ROdTCzZzsvqZ+6PVaTkUmvK+YMdkTgdSki4TZt5IXXXXXXXXXXXXXXXXXXXXXXXX:R7g8+6PZvK+YMdk

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      keulompy.exe

    • Size

      13.0MB

    • MD5

      2303196f2416629f0fe3ea16d6eb89c0

    • SHA1

      5d37ba77ce2839d3875876a2f61b3782e7d81ebb

    • SHA256

      51ac9e66490d43f06ad67e19e241b2a45489c558bc75a35f2d3403bfdc3adef4

    • SHA512

      02cbf4613104265bc8f07bb7337d4a60163e41344ca2e64b139c148d42b6711bea669305cdb6123625c4460ddcf41120650fbe3d393c618cf2766494d2a92894

    • SSDEEP

      6144:ROdTCzZzsvqZ+6PVaTkUmvK+YMdkTgdSki4TZt5IXXXXXXXXXXXXXXXXXXXXXXXX:R7g8+6PZvK+YMdk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks