General

  • Target

    fde1678345d5c44d4d4850402fad1ea7b0d509652258ae34cb98b0b234e64309.exe

  • Size

    10.5MB

  • Sample

    241120-z3vt5atlfs

  • MD5

    d86ffcc25b33e1567b2136d1ac2b4e85

  • SHA1

    dd088c1b72bb1d8917655cc0c301f5c0fa74dafa

  • SHA256

    fde1678345d5c44d4d4850402fad1ea7b0d509652258ae34cb98b0b234e64309

  • SHA512

    8f9ad8a7d9a292019cbaea903dd2733fc1f51419ab051541cddc55e6ba8624042b2c73ea97107daaa695408a1ad3505a424d8114d14660fcc401e08587cbf4b6

  • SSDEEP

    49152:IN5555555555555555555555555555555555555555555555555555555555555b:O

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      fde1678345d5c44d4d4850402fad1ea7b0d509652258ae34cb98b0b234e64309.exe

    • Size

      10.5MB

    • MD5

      d86ffcc25b33e1567b2136d1ac2b4e85

    • SHA1

      dd088c1b72bb1d8917655cc0c301f5c0fa74dafa

    • SHA256

      fde1678345d5c44d4d4850402fad1ea7b0d509652258ae34cb98b0b234e64309

    • SHA512

      8f9ad8a7d9a292019cbaea903dd2733fc1f51419ab051541cddc55e6ba8624042b2c73ea97107daaa695408a1ad3505a424d8114d14660fcc401e08587cbf4b6

    • SSDEEP

      49152:IN5555555555555555555555555555555555555555555555555555555555555b:O

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks