General

  • Target

    b31a4fce3073218756ef0c2ebce409288bba3d9dca83a47476cc38316d90a5b8N.exe

  • Size

    320KB

  • Sample

    241220-b3534awpgj

  • MD5

    e0cf01f8e4d92943522cd69b01dcf100

  • SHA1

    e47238b98f51c0384fea167f3054e63c48cee720

  • SHA256

    b31a4fce3073218756ef0c2ebce409288bba3d9dca83a47476cc38316d90a5b8

  • SHA512

    ceb3aa49012c565f3657eb78cc94e2e95a5bce72b8ad361a2e7d2cadcd6ad1869bda22db784034219af80ed9e9cd09268f938c1049fd26b34a288b66c3a899ba

  • SSDEEP

    6144:08FOumLCE/jANU0VSaimnpnv9/2Hh5Sao2JUjJUrecECM:08FdmOE/y7QaimlF2UR2JMJUrq

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      b31a4fce3073218756ef0c2ebce409288bba3d9dca83a47476cc38316d90a5b8N.exe

    • Size

      320KB

    • MD5

      e0cf01f8e4d92943522cd69b01dcf100

    • SHA1

      e47238b98f51c0384fea167f3054e63c48cee720

    • SHA256

      b31a4fce3073218756ef0c2ebce409288bba3d9dca83a47476cc38316d90a5b8

    • SHA512

      ceb3aa49012c565f3657eb78cc94e2e95a5bce72b8ad361a2e7d2cadcd6ad1869bda22db784034219af80ed9e9cd09268f938c1049fd26b34a288b66c3a899ba

    • SSDEEP

      6144:08FOumLCE/jANU0VSaimnpnv9/2Hh5Sao2JUjJUrecECM:08FdmOE/y7QaimlF2UR2JMJUrq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks