General

  • Target

    cf426b4bd4d5243c3d88355b980084776d885c36dfb179975f28af9578deaf0c

  • Size

    167KB

  • Sample

    241221-wa9k2avncr

  • MD5

    c2dd5c2437c8dfee1e944b43354c2345

  • SHA1

    6b4275b19ac0d4c976beee7b774ffe304376da8f

  • SHA256

    cf426b4bd4d5243c3d88355b980084776d885c36dfb179975f28af9578deaf0c

  • SHA512

    892e044aa9fa4b29912c70a927cb6d72f952c333662cc22a08649aa1f639be53f54ab4409a2f5305ce8651ff2c7503609542748c8b9960a1260e505664070e36

  • SSDEEP

    3072:HWt4tFAaLDnwOa8aCj9LRnj1A752+HoALd1HHX:2ALDwB8awTnj3+HoiP

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      cf426b4bd4d5243c3d88355b980084776d885c36dfb179975f28af9578deaf0c

    • Size

      167KB

    • MD5

      c2dd5c2437c8dfee1e944b43354c2345

    • SHA1

      6b4275b19ac0d4c976beee7b774ffe304376da8f

    • SHA256

      cf426b4bd4d5243c3d88355b980084776d885c36dfb179975f28af9578deaf0c

    • SHA512

      892e044aa9fa4b29912c70a927cb6d72f952c333662cc22a08649aa1f639be53f54ab4409a2f5305ce8651ff2c7503609542748c8b9960a1260e505664070e36

    • SSDEEP

      3072:HWt4tFAaLDnwOa8aCj9LRnj1A752+HoALd1HHX:2ALDwB8awTnj3+HoiP

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks