General

  • Target

    d0a0ca092838272e6388908e3add4baec96a62c7e79dc60dad9116fe77f7cdca

  • Size

    280KB

  • Sample

    241221-v715gsvkes

  • MD5

    1efcf9901e3eccbd59173a37452e238b

  • SHA1

    9585897fce73f306b95a2c088483438893b62853

  • SHA256

    d0a0ca092838272e6388908e3add4baec96a62c7e79dc60dad9116fe77f7cdca

  • SHA512

    5eebeec99f6aaa67729e5a1dc19a5a7dccc9b7f47e4f721df8440c071cfa95698d4321eefb9faee4e21fadda9ea6f60c14030b1818450f11dd2bdd833a408cfd

  • SSDEEP

    6144:DU6BbccF0QC7hSIZ34p4rIlROhxxpeTr/ekIw:3BbLF0d7hWGrICzxp6L

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d0a0ca092838272e6388908e3add4baec96a62c7e79dc60dad9116fe77f7cdca

    • Size

      280KB

    • MD5

      1efcf9901e3eccbd59173a37452e238b

    • SHA1

      9585897fce73f306b95a2c088483438893b62853

    • SHA256

      d0a0ca092838272e6388908e3add4baec96a62c7e79dc60dad9116fe77f7cdca

    • SHA512

      5eebeec99f6aaa67729e5a1dc19a5a7dccc9b7f47e4f721df8440c071cfa95698d4321eefb9faee4e21fadda9ea6f60c14030b1818450f11dd2bdd833a408cfd

    • SSDEEP

      6144:DU6BbccF0QC7hSIZ34p4rIlROhxxpeTr/ekIw:3BbLF0d7hWGrICzxp6L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks