General

  • Target

    e7c93d1b0d7840be4795a7f33e1ca1ac19f7a3ee14dffcf7a2d0b67d2fd2017fN

  • Size

    10.0MB

  • Sample

    241107-axlxlatmfk

  • MD5

    142dadf7191c524a11eee9b4660c3540

  • SHA1

    e676b0a4c0cc8f5d7e42b42866d717f30327b221

  • SHA256

    e7c93d1b0d7840be4795a7f33e1ca1ac19f7a3ee14dffcf7a2d0b67d2fd2017f

  • SHA512

    7a17f72cbc71a7e52365cbf8e31b1439d804ea5f75f8548744d9c2cd541a83280eeb6987e473e9a962ab6a1cfdd14dc5258bd069a2bbff21f848dc727b126347

  • SSDEEP

    12288:lef9tiUIxYjvVzL10J7nnXVJAj1666666666666666666666666666666666666n:leriUGiP0J7n

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      e7c93d1b0d7840be4795a7f33e1ca1ac19f7a3ee14dffcf7a2d0b67d2fd2017fN

    • Size

      10.0MB

    • MD5

      142dadf7191c524a11eee9b4660c3540

    • SHA1

      e676b0a4c0cc8f5d7e42b42866d717f30327b221

    • SHA256

      e7c93d1b0d7840be4795a7f33e1ca1ac19f7a3ee14dffcf7a2d0b67d2fd2017f

    • SHA512

      7a17f72cbc71a7e52365cbf8e31b1439d804ea5f75f8548744d9c2cd541a83280eeb6987e473e9a962ab6a1cfdd14dc5258bd069a2bbff21f848dc727b126347

    • SSDEEP

      12288:lef9tiUIxYjvVzL10J7nnXVJAj1666666666666666666666666666666666666n:leriUGiP0J7n

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks