General

  • Target

    b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb

  • Size

    12.1MB

  • Sample

    241031-vq5fkszmft

  • MD5

    ffa1b8f70c8986ed5d92cc065e09e9d0

  • SHA1

    a3dc175cbaf7da499dd09298e303144fac0ec032

  • SHA256

    b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb

  • SHA512

    60dcb3bb2d9720b8012452c57bfb4633ae5e14892bc99306a5d70864fa72dbdceae8278aec6ebf1223baf5d2ff2664b1fe88a728f8254a71ab41cd2fde3d8e4d

  • SSDEEP

    24576:iW6y/MK+Iw9zXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:Z7X

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb

    • Size

      12.1MB

    • MD5

      ffa1b8f70c8986ed5d92cc065e09e9d0

    • SHA1

      a3dc175cbaf7da499dd09298e303144fac0ec032

    • SHA256

      b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb

    • SHA512

      60dcb3bb2d9720b8012452c57bfb4633ae5e14892bc99306a5d70864fa72dbdceae8278aec6ebf1223baf5d2ff2664b1fe88a728f8254a71ab41cd2fde3d8e4d

    • SSDEEP

      24576:iW6y/MK+Iw9zXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:Z7X

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks