General

  • Target

    d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b

  • Size

    186KB

  • Sample

    241216-t8a41svqgw

  • MD5

    4d9297b248ed13ac52436ef04511e986

  • SHA1

    3116c6d61588c105f45aac1955d2c97c13fdbc62

  • SHA256

    d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b

  • SHA512

    6d8b8dd0ab65aeafab0de40d62a84a8f10933ec68721c9364be617de750040e55c6a8c83a03d347d42f674e8520a298f19adc883324bbedeb2b4a6c3e367f66b

  • SSDEEP

    3072:VkQXln7jRj2swOUpjv8ChQeG5CVjH5f6x:yQXlXRjLwOU2CvJx

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b

    • Size

      186KB

    • MD5

      4d9297b248ed13ac52436ef04511e986

    • SHA1

      3116c6d61588c105f45aac1955d2c97c13fdbc62

    • SHA256

      d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b

    • SHA512

      6d8b8dd0ab65aeafab0de40d62a84a8f10933ec68721c9364be617de750040e55c6a8c83a03d347d42f674e8520a298f19adc883324bbedeb2b4a6c3e367f66b

    • SSDEEP

      3072:VkQXln7jRj2swOUpjv8ChQeG5CVjH5f6x:yQXlXRjLwOU2CvJx

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks