General

  • Target

    c50e7c2d2c00a1af395a135c572cd87831018afc3d8b9e1cb4ef52b830ebacf1

  • Size

    296KB

  • Sample

    241221-v53kjavlfk

  • MD5

    67a2a9995cd99df72c5081dbfa1c1ce5

  • SHA1

    83038eaceb154fe11abd360df3278bbb15a9d581

  • SHA256

    c50e7c2d2c00a1af395a135c572cd87831018afc3d8b9e1cb4ef52b830ebacf1

  • SHA512

    bb2794429057896e92be9dea9fd1ed51e21e873c96bb3402dd229cfb9181b05d71ff519790ac3c0316bfec8402eb3f5738e0bfab00c7ddb1af92c0d1d74d8de8

  • SSDEEP

    6144:kC35+ynOr72R6HfyNX26SXuZet0yy87oG+FPxuISKt0:kCp+YOr7z/yNG6SXuZet0yy87WPxuIf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      c50e7c2d2c00a1af395a135c572cd87831018afc3d8b9e1cb4ef52b830ebacf1

    • Size

      296KB

    • MD5

      67a2a9995cd99df72c5081dbfa1c1ce5

    • SHA1

      83038eaceb154fe11abd360df3278bbb15a9d581

    • SHA256

      c50e7c2d2c00a1af395a135c572cd87831018afc3d8b9e1cb4ef52b830ebacf1

    • SHA512

      bb2794429057896e92be9dea9fd1ed51e21e873c96bb3402dd229cfb9181b05d71ff519790ac3c0316bfec8402eb3f5738e0bfab00c7ddb1af92c0d1d74d8de8

    • SSDEEP

      6144:kC35+ynOr72R6HfyNX26SXuZet0yy87oG+FPxuISKt0:kCp+YOr7z/yNG6SXuZet0yy87WPxuIf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks