General

  • Target

    cd61ea8708b9c3c220abea2b04d5cc209fd8949d3b88575dab0289539b232f97.exe

  • Size

    12.1MB

  • Sample

    241122-km97jstmdm

  • MD5

    0933a84caaad7a803af9327f00b427ea

  • SHA1

    a819feb2801a42a00108a1e5989c0b8cab3a7620

  • SHA256

    cd61ea8708b9c3c220abea2b04d5cc209fd8949d3b88575dab0289539b232f97

  • SHA512

    665358ff9632179f2a872ff3b7d8185ba842569aa9af95cd9a65851d24d750bc9eebe50acb76e4b4cb1808baeed4637eaca167f01e6f89a720b4349ae9338a38

  • SSDEEP

    49152:P1m333333333333333333333333333333333333333333333333333333333333w:d

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      cd61ea8708b9c3c220abea2b04d5cc209fd8949d3b88575dab0289539b232f97.exe

    • Size

      12.1MB

    • MD5

      0933a84caaad7a803af9327f00b427ea

    • SHA1

      a819feb2801a42a00108a1e5989c0b8cab3a7620

    • SHA256

      cd61ea8708b9c3c220abea2b04d5cc209fd8949d3b88575dab0289539b232f97

    • SHA512

      665358ff9632179f2a872ff3b7d8185ba842569aa9af95cd9a65851d24d750bc9eebe50acb76e4b4cb1808baeed4637eaca167f01e6f89a720b4349ae9338a38

    • SSDEEP

      49152:P1m333333333333333333333333333333333333333333333333333333333333w:d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks