General

  • Target

    369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.bin

  • Size

    11.8MB

  • Sample

    240917-mttjgsyfnn

  • MD5

    af9f5adf151afef5a8c8378e1ea0799d

  • SHA1

    69ec980d31caf71bdc12cdc1f30bcb92c110a523

  • SHA256

    369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94

  • SHA512

    c80c35c561a64e82bd7388e1d64e95cf8bdc282869a5daa1d051dbdae613c982be341236114a6efd2769f0f3ef98aaeeba1b3bc489a2222fc72d3d282270d533

  • SSDEEP

    12288:ptfqkWH3ZIQqcggggggggggggggggggggggggggggggggggggggggggggggggggw:pY1HpLq

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.bin

    • Size

      11.8MB

    • MD5

      af9f5adf151afef5a8c8378e1ea0799d

    • SHA1

      69ec980d31caf71bdc12cdc1f30bcb92c110a523

    • SHA256

      369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94

    • SHA512

      c80c35c561a64e82bd7388e1d64e95cf8bdc282869a5daa1d051dbdae613c982be341236114a6efd2769f0f3ef98aaeeba1b3bc489a2222fc72d3d282270d533

    • SSDEEP

      12288:ptfqkWH3ZIQqcggggggggggggggggggggggggggggggggggggggggggggggggggw:pY1HpLq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks