General

  • Target

    892d52a127cf179e7f2430a3089d6751.virus

  • Size

    13.7MB

  • Sample

    240917-mx2dhayhjr

  • MD5

    892d52a127cf179e7f2430a3089d6751

  • SHA1

    37d424fbb05030b85372619f90d49dfb3163b516

  • SHA256

    0e9c337b32f1b91661c0aa92183242ca766a24f0e2ced39622076a00f07324db

  • SHA512

    80a284d3ec88d27f78d78cb40de26f0e57ab36c09ebc302dca668196f95c6cf4bd09181c1f2e64bc77e326a5f8994110075d185fc7b845e2314c54923a901960

  • SSDEEP

    12288:qkcLVukCo8F8JeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMu:qkkYkCoD

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      892d52a127cf179e7f2430a3089d6751.virus

    • Size

      13.7MB

    • MD5

      892d52a127cf179e7f2430a3089d6751

    • SHA1

      37d424fbb05030b85372619f90d49dfb3163b516

    • SHA256

      0e9c337b32f1b91661c0aa92183242ca766a24f0e2ced39622076a00f07324db

    • SHA512

      80a284d3ec88d27f78d78cb40de26f0e57ab36c09ebc302dca668196f95c6cf4bd09181c1f2e64bc77e326a5f8994110075d185fc7b845e2314c54923a901960

    • SSDEEP

      12288:qkcLVukCo8F8JeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMeMu:qkkYkCoD

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks