General

  • Target

    0a131a082b4fb56695e1a0d6532254286baaacec7a880f6d8ce8c6834072ea90.exe

  • Size

    13.0MB

  • Sample

    241121-jfrwyszhrl

  • MD5

    38a85adfdcbda17fe01e01c8cf39289d

  • SHA1

    eb8f22a914d9f6a8b7b7cca8394db6a261675c8c

  • SHA256

    0a131a082b4fb56695e1a0d6532254286baaacec7a880f6d8ce8c6834072ea90

  • SHA512

    ecf37aa2f234b9a795e3e0ef04e4713eacdcc50d3b56a0c6c3a495cf23e848ea84acd5313094c639ff4a310cf5c67b8a2e271dfe7a5e1a1eecf6e0c813ea1acd

  • SSDEEP

    49152:hOFK1llllllllllllllllllllllllllllllllllllllllllllllllllllllllllq:9g

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      0a131a082b4fb56695e1a0d6532254286baaacec7a880f6d8ce8c6834072ea90.exe

    • Size

      13.0MB

    • MD5

      38a85adfdcbda17fe01e01c8cf39289d

    • SHA1

      eb8f22a914d9f6a8b7b7cca8394db6a261675c8c

    • SHA256

      0a131a082b4fb56695e1a0d6532254286baaacec7a880f6d8ce8c6834072ea90

    • SHA512

      ecf37aa2f234b9a795e3e0ef04e4713eacdcc50d3b56a0c6c3a495cf23e848ea84acd5313094c639ff4a310cf5c67b8a2e271dfe7a5e1a1eecf6e0c813ea1acd

    • SSDEEP

      49152:hOFK1llllllllllllllllllllllllllllllllllllllllllllllllllllllllllq:9g

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks