General

  • Target

    5e9350587e873fdbf01b1698a64fd03fa7988d212d23bc767471379a220c4cd5.exe

  • Size

    13.3MB

  • Sample

    241123-yegf6ayrbn

  • MD5

    3b04b6eae24e67d0164af3b3e083da8e

  • SHA1

    646af8bcc69301c0e1d2da9b2e36a1304ffaa786

  • SHA256

    5e9350587e873fdbf01b1698a64fd03fa7988d212d23bc767471379a220c4cd5

  • SHA512

    6200e767e2c65a4eb102e7cb086525b74691f9b5a5f16196136a68060ed66e1442d9d106c3c7b17ccc21b52b1ff77f855e2749a0ec87aa5eb6e33be7ccb74ccb

  • SSDEEP

    98304:jRooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo9:A

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      5e9350587e873fdbf01b1698a64fd03fa7988d212d23bc767471379a220c4cd5.exe

    • Size

      13.3MB

    • MD5

      3b04b6eae24e67d0164af3b3e083da8e

    • SHA1

      646af8bcc69301c0e1d2da9b2e36a1304ffaa786

    • SHA256

      5e9350587e873fdbf01b1698a64fd03fa7988d212d23bc767471379a220c4cd5

    • SHA512

      6200e767e2c65a4eb102e7cb086525b74691f9b5a5f16196136a68060ed66e1442d9d106c3c7b17ccc21b52b1ff77f855e2749a0ec87aa5eb6e33be7ccb74ccb

    • SSDEEP

      98304:jRooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo9:A

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks