General

  • Target

    eb23f56dfaa83993bbc64dd0bbaabb55d03efc165400d97917c1d0f61e30d447.exe

  • Size

    12.9MB

  • Sample

    241124-eqd1matkcv

  • MD5

    27bc92160d3d4e66f593e9f8f3023dff

  • SHA1

    920930e48cc64142bdb9643b6f03152423f22fce

  • SHA256

    eb23f56dfaa83993bbc64dd0bbaabb55d03efc165400d97917c1d0f61e30d447

  • SHA512

    68dddd1252274b8d7c029f84128d9f16d2f78f72dc22c548c6f296efbf6893c5b26f04aa1eeda4c1f76f5dfb016fb274618c94dd6650992796a016aa52b989ed

  • SSDEEP

    49152:nyzapZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ0:nCB

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      eb23f56dfaa83993bbc64dd0bbaabb55d03efc165400d97917c1d0f61e30d447.exe

    • Size

      12.9MB

    • MD5

      27bc92160d3d4e66f593e9f8f3023dff

    • SHA1

      920930e48cc64142bdb9643b6f03152423f22fce

    • SHA256

      eb23f56dfaa83993bbc64dd0bbaabb55d03efc165400d97917c1d0f61e30d447

    • SHA512

      68dddd1252274b8d7c029f84128d9f16d2f78f72dc22c548c6f296efbf6893c5b26f04aa1eeda4c1f76f5dfb016fb274618c94dd6650992796a016aa52b989ed

    • SSDEEP

      49152:nyzapZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ0:nCB

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks