General

  • Target

    f69e35008ad31989cad3811a319b264b.bin

  • Size

    136KB

  • Sample

    240928-swar2ssfrq

  • MD5

    001b83f5f63bdddf7b9890132205ffb3

  • SHA1

    bcaa796c181ad2e1eac7d69fbcec79ace70f930a

  • SHA256

    c1cbda06fa09ad8b052567ce3a5d40e9916b024db8ef190afa0bab620b1cee62

  • SHA512

    54bc95c9fb698272568e2ab1aeabdd992f7fa39d5ef62d2b2b46d56c00c4ec96e6453bbfc4e5e18aa1cbe389347a861fd757dec5d8da490f9d21232a8ede8f46

  • SSDEEP

    3072:TI/HIR//+aWWGKsCuysrZTQrijOqkIdiLTufNKKs:M/Hw/+JWhsdysrZTxkIWaf8

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487.exe

    • Size

      194KB

    • MD5

      f69e35008ad31989cad3811a319b264b

    • SHA1

      dac099de5c3d43638b13318e7e082f0db6f61884

    • SHA256

      e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487

    • SHA512

      a00e1c846883064b76bcadb88bb57db4358d0d096d1d7fec329e90f57ee5f77699bc3e6b4b5f571305850e218affe80d42515a3cbbcd02db2f6a1d62a72d832e

    • SSDEEP

      3072:IaXTO21fKhR2MbLUYUQvkWnp95DhO2Wv3yfrWIatkh8MKL5PHr8A8HOgzb3V:9XTpUh/bLdTM6AvCzWIatkh8MM5OV

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks