General

  • Target

    c12c0818b3943d544dde026c24b31163

  • Size

    12.2MB

  • Sample

    240917-mznv7ayhrr

  • MD5

    c12c0818b3943d544dde026c24b31163

  • SHA1

    846bb3c582a475ceca650dc0cb7b21e1c0a46faf

  • SHA256

    fda2cf0c4eabc5b1a0dfb821ea8605b71d190b2e46f9c13fe17a344357c0fd87

  • SHA512

    90093573f77c50742763fcbe7ad2a71e72ba726e3cf6e4e7513773d2189ba14654163218d29847d81e166888d517864330b04201516073e88aa37581837a27db

  • SSDEEP

    12288:jtfqkWH3ZIQqcggggggggggggggggggggggggggggggggggggggggggggggggggM:jY1HpLq

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      c12c0818b3943d544dde026c24b31163

    • Size

      12.2MB

    • MD5

      c12c0818b3943d544dde026c24b31163

    • SHA1

      846bb3c582a475ceca650dc0cb7b21e1c0a46faf

    • SHA256

      fda2cf0c4eabc5b1a0dfb821ea8605b71d190b2e46f9c13fe17a344357c0fd87

    • SHA512

      90093573f77c50742763fcbe7ad2a71e72ba726e3cf6e4e7513773d2189ba14654163218d29847d81e166888d517864330b04201516073e88aa37581837a27db

    • SSDEEP

      12288:jtfqkWH3ZIQqcggggggggggggggggggggggggggggggggggggggggggggggggggM:jY1HpLq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks