General

  • Target

    e4e8ef55981e665421399aadfd906c81d0dae7bf88b8f31f2979f4faa88fc46f.exe

  • Size

    13.9MB

  • Sample

    241120-yrgmpawrhn

  • MD5

    74d022d0ed2f393fe0b210879b3456bb

  • SHA1

    ae369acf20264ab7cb35b3301b12b14ad6e71d73

  • SHA256

    e4e8ef55981e665421399aadfd906c81d0dae7bf88b8f31f2979f4faa88fc46f

  • SHA512

    1ab7e4dd174754e0187e31149ec93c56f1a495bc4c4c815737df4d01d19eb50c9533bd947ccef75c3344bc17de62103ffa157e8c8a1cad9b8b60badd784b95a0

  • SSDEEP

    393216:BMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMl:BMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMl

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      e4e8ef55981e665421399aadfd906c81d0dae7bf88b8f31f2979f4faa88fc46f.exe

    • Size

      13.9MB

    • MD5

      74d022d0ed2f393fe0b210879b3456bb

    • SHA1

      ae369acf20264ab7cb35b3301b12b14ad6e71d73

    • SHA256

      e4e8ef55981e665421399aadfd906c81d0dae7bf88b8f31f2979f4faa88fc46f

    • SHA512

      1ab7e4dd174754e0187e31149ec93c56f1a495bc4c4c815737df4d01d19eb50c9533bd947ccef75c3344bc17de62103ffa157e8c8a1cad9b8b60badd784b95a0

    • SSDEEP

      393216:BMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMl:BMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks