General

  • Target

    930b96bbec596e80fd6b6e4a37c34000113e1affb5f1aadbce2049f5800a6fce.exe

  • Size

    238KB

  • Sample

    241014-b3crjszbrj

  • MD5

    7ea98bd7f6a69b385310f5eaa86b6828

  • SHA1

    ab3ee16a99f901336fa6221f4fdc84e562154841

  • SHA256

    930b96bbec596e80fd6b6e4a37c34000113e1affb5f1aadbce2049f5800a6fce

  • SHA512

    25f618ee87b577eec384fd49c40fe00dfa4caaf50b36227431ba838dd461024256a578857026d0942db495a6894b51a55d84190cbe78ab55f46c3c6471a0eb09

  • SSDEEP

    3072:vRSPDpmSd0310NWYOTLGp+6vDYCm0aW9s/aL/MOvobE80Ogdh1ei4T6Ql:vyDpmSK3104/LS+alDz/MRP0Vdh1tQ

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      930b96bbec596e80fd6b6e4a37c34000113e1affb5f1aadbce2049f5800a6fce.exe

    • Size

      238KB

    • MD5

      7ea98bd7f6a69b385310f5eaa86b6828

    • SHA1

      ab3ee16a99f901336fa6221f4fdc84e562154841

    • SHA256

      930b96bbec596e80fd6b6e4a37c34000113e1affb5f1aadbce2049f5800a6fce

    • SHA512

      25f618ee87b577eec384fd49c40fe00dfa4caaf50b36227431ba838dd461024256a578857026d0942db495a6894b51a55d84190cbe78ab55f46c3c6471a0eb09

    • SSDEEP

      3072:vRSPDpmSd0310NWYOTLGp+6vDYCm0aW9s/aL/MOvobE80Ogdh1ei4T6Ql:vyDpmSK3104/LS+alDz/MRP0Vdh1tQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks