General

  • Target

    01a3cf94ba0e78a542e66b981301ea8ebf542d1098347b95bcfc212dea05df5e

  • Size

    240KB

  • Sample

    241221-vy4h9atqhv

  • MD5

    69b2a19e75554cb40fbc387b8d8e4782

  • SHA1

    830d8bad91fe3d6d0265563893daff8760a7ea56

  • SHA256

    01a3cf94ba0e78a542e66b981301ea8ebf542d1098347b95bcfc212dea05df5e

  • SHA512

    5a407594131f9b74fdbebf25ce892e9693e98b555557b3bc84d7489d910760f632d098cef878c5ec3fafe05457a544c0cff31f2c09a5967631bd6dfc6342d6b4

  • SSDEEP

    3072:VqP++Vt8ew8DIQsUCbrR0aL77yf5t86FrKl3c+8JZdkfmwpFcvP:VqGPedDtKbr8GlMnXgmpH

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      01a3cf94ba0e78a542e66b981301ea8ebf542d1098347b95bcfc212dea05df5e

    • Size

      240KB

    • MD5

      69b2a19e75554cb40fbc387b8d8e4782

    • SHA1

      830d8bad91fe3d6d0265563893daff8760a7ea56

    • SHA256

      01a3cf94ba0e78a542e66b981301ea8ebf542d1098347b95bcfc212dea05df5e

    • SHA512

      5a407594131f9b74fdbebf25ce892e9693e98b555557b3bc84d7489d910760f632d098cef878c5ec3fafe05457a544c0cff31f2c09a5967631bd6dfc6342d6b4

    • SSDEEP

      3072:VqP++Vt8ew8DIQsUCbrR0aL77yf5t86FrKl3c+8JZdkfmwpFcvP:VqGPedDtKbr8GlMnXgmpH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks