General

  • Target

    c9de4b54faf92e550c243ba8364a01f1e5ac5f1906069ccc05391a78d83e9456

  • Size

    247KB

  • Sample

    240926-cm7sesvala

  • MD5

    d454c66549a2a4d14117bd74db531ec5

  • SHA1

    81aec0b242c051e83cf9a40a1c878b6b61435a04

  • SHA256

    c9de4b54faf92e550c243ba8364a01f1e5ac5f1906069ccc05391a78d83e9456

  • SHA512

    688376441cf802fbd0c03f638c6e4b8ed6088662fb08968ca9c5592ad7d5f7f8eff12cd531670d8e3b8c2fbf3eb1edcd234f5652a82495b5f8d4acdb880c5740

  • SSDEEP

    3072:BrLMNa0RHtLiSJ8mVvlRncMK2n5tXVYz3M5Q3a/xZ2HQaej:BrLMUIHNig3DGMzFYc5Q3ER

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      c9de4b54faf92e550c243ba8364a01f1e5ac5f1906069ccc05391a78d83e9456

    • Size

      247KB

    • MD5

      d454c66549a2a4d14117bd74db531ec5

    • SHA1

      81aec0b242c051e83cf9a40a1c878b6b61435a04

    • SHA256

      c9de4b54faf92e550c243ba8364a01f1e5ac5f1906069ccc05391a78d83e9456

    • SHA512

      688376441cf802fbd0c03f638c6e4b8ed6088662fb08968ca9c5592ad7d5f7f8eff12cd531670d8e3b8c2fbf3eb1edcd234f5652a82495b5f8d4acdb880c5740

    • SSDEEP

      3072:BrLMNa0RHtLiSJ8mVvlRncMK2n5tXVYz3M5Q3a/xZ2HQaej:BrLMUIHNig3DGMzFYc5Q3ER

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks