General

  • Target

    b0fb789b12fe519394c6e06244144714dc69e11aedef07afae8613825a334232

  • Size

    10.2MB

  • Sample

    241103-jhq3faygnr

  • MD5

    6a0022b6a2cd33ab4b1101994ecc83b0

  • SHA1

    bdf20c798bbaf6e8c8fa7da8a9485046a03b02fb

  • SHA256

    b0fb789b12fe519394c6e06244144714dc69e11aedef07afae8613825a334232

  • SHA512

    dbf1341b52c6970151073494c1c398b9e1bed803a10f7f907a4fe079c5632569902fcc3729c85d8760b404ab92be302b57ac963c3658158d1dcba50fc4fd82bc

  • SSDEEP

    24576:nW6y/MK+Iw9zXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:W7X

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      b0fb789b12fe519394c6e06244144714dc69e11aedef07afae8613825a334232

    • Size

      10.2MB

    • MD5

      6a0022b6a2cd33ab4b1101994ecc83b0

    • SHA1

      bdf20c798bbaf6e8c8fa7da8a9485046a03b02fb

    • SHA256

      b0fb789b12fe519394c6e06244144714dc69e11aedef07afae8613825a334232

    • SHA512

      dbf1341b52c6970151073494c1c398b9e1bed803a10f7f907a4fe079c5632569902fcc3729c85d8760b404ab92be302b57ac963c3658158d1dcba50fc4fd82bc

    • SSDEEP

      24576:nW6y/MK+Iw9zXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:W7X

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks