General

  • Target

    2593f55632b67e0b175337f44719e487b6f79c8ef46a06f10547ae71e6c63889.exe

  • Size

    10.1MB

  • Sample

    241122-nv4lhszmdw

  • MD5

    0e5a9c35b3d357763c7a52db54daf211

  • SHA1

    65bd31bc2fc54a359e9eb1a7abb03bc71d2e7c2b

  • SHA256

    2593f55632b67e0b175337f44719e487b6f79c8ef46a06f10547ae71e6c63889

  • SHA512

    3ec7ba172ed8fe2e9edd0c024b92ff00a9deb619ea16cff28ff7a49eacbd0b9139c03103da2d163d1305221b5016f181dd871cebdce75bfd9fed8586486e1520

  • SSDEEP

    49152:pkHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH/:q

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      2593f55632b67e0b175337f44719e487b6f79c8ef46a06f10547ae71e6c63889.exe

    • Size

      10.1MB

    • MD5

      0e5a9c35b3d357763c7a52db54daf211

    • SHA1

      65bd31bc2fc54a359e9eb1a7abb03bc71d2e7c2b

    • SHA256

      2593f55632b67e0b175337f44719e487b6f79c8ef46a06f10547ae71e6c63889

    • SHA512

      3ec7ba172ed8fe2e9edd0c024b92ff00a9deb619ea16cff28ff7a49eacbd0b9139c03103da2d163d1305221b5016f181dd871cebdce75bfd9fed8586486e1520

    • SSDEEP

      49152:pkHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH/:q

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks