General

  • Target

    91fb824a61a9ddb8c1f961e2f3b1acde927c129ea64c117272fbb5f25f40f91d

  • Size

    10.1MB

  • Sample

    241123-ydrwhaspet

  • MD5

    fbebf7e29e3295a4d97c825b1efd17f0

  • SHA1

    84dbfb2b72a828c9bd7024dac9e0344f68c2c6c9

  • SHA256

    91fb824a61a9ddb8c1f961e2f3b1acde927c129ea64c117272fbb5f25f40f91d

  • SHA512

    f1d905a77db3160010c8aa19bdc4522b6f0900ebab5e585331f7724a30d887f6b35714f420f6a13f6a775e77b7f2c6bbf6a3387168e935f2a0e56de8d05c3a66

  • SSDEEP

    49152:3vUWkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkn:3

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      91fb824a61a9ddb8c1f961e2f3b1acde927c129ea64c117272fbb5f25f40f91d

    • Size

      10.1MB

    • MD5

      fbebf7e29e3295a4d97c825b1efd17f0

    • SHA1

      84dbfb2b72a828c9bd7024dac9e0344f68c2c6c9

    • SHA256

      91fb824a61a9ddb8c1f961e2f3b1acde927c129ea64c117272fbb5f25f40f91d

    • SHA512

      f1d905a77db3160010c8aa19bdc4522b6f0900ebab5e585331f7724a30d887f6b35714f420f6a13f6a775e77b7f2c6bbf6a3387168e935f2a0e56de8d05c3a66

    • SSDEEP

      49152:3vUWkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkn:3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks