General

  • Target

    e01f2cb49081fb01eb0af6a7369d5b678b677f2e9811817ba7bbd854cb24b539N

  • Size

    249KB

  • Sample

    241005-wkxdfsybkr

  • MD5

    35d94a64c3beb2bd39080b05fc763f70

  • SHA1

    5f08d3f5d0998b6eb80dd986b8efe628a5c58e19

  • SHA256

    e01f2cb49081fb01eb0af6a7369d5b678b677f2e9811817ba7bbd854cb24b539

  • SHA512

    5803cabffde0c2c62b94ce88d7243422badfc680522816d41e81b57ede4973132a3d3802b90e7dd379375409dd57d1232e796b541240819ade75b3ae2d39e2a4

  • SSDEEP

    3072:2GGHLMg57JJiSWbWkyYhnNh/RE/GtymuQ2fgu5NlssAxaxWT6Uf7J:RGHLMwlEBDxZY/Wmel

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      e01f2cb49081fb01eb0af6a7369d5b678b677f2e9811817ba7bbd854cb24b539N

    • Size

      249KB

    • MD5

      35d94a64c3beb2bd39080b05fc763f70

    • SHA1

      5f08d3f5d0998b6eb80dd986b8efe628a5c58e19

    • SHA256

      e01f2cb49081fb01eb0af6a7369d5b678b677f2e9811817ba7bbd854cb24b539

    • SHA512

      5803cabffde0c2c62b94ce88d7243422badfc680522816d41e81b57ede4973132a3d3802b90e7dd379375409dd57d1232e796b541240819ade75b3ae2d39e2a4

    • SSDEEP

      3072:2GGHLMg57JJiSWbWkyYhnNh/RE/GtymuQ2fgu5NlssAxaxWT6Uf7J:RGHLMwlEBDxZY/Wmel

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks