General
-
Target
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b
-
Size
186KB
-
Sample
241216-t8a41svqgw
-
MD5
4d9297b248ed13ac52436ef04511e986
-
SHA1
3116c6d61588c105f45aac1955d2c97c13fdbc62
-
SHA256
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b
-
SHA512
6d8b8dd0ab65aeafab0de40d62a84a8f10933ec68721c9364be617de750040e55c6a8c83a03d347d42f674e8520a298f19adc883324bbedeb2b4a6c3e367f66b
-
SSDEEP
3072:VkQXln7jRj2swOUpjv8ChQeG5CVjH5f6x:yQXlXRjLwOU2CvJx
Static task
static1
Behavioral task
behavioral1
Sample
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b
-
Size
186KB
-
MD5
4d9297b248ed13ac52436ef04511e986
-
SHA1
3116c6d61588c105f45aac1955d2c97c13fdbc62
-
SHA256
d490f432985a964e5442320f634b2cfd3aff7f32df02001abb308b7592b6a58b
-
SHA512
6d8b8dd0ab65aeafab0de40d62a84a8f10933ec68721c9364be617de750040e55c6a8c83a03d347d42f674e8520a298f19adc883324bbedeb2b4a6c3e367f66b
-
SSDEEP
3072:VkQXln7jRj2swOUpjv8ChQeG5CVjH5f6x:yQXlXRjLwOU2CvJx
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2