General

  • Target

    588c821f2829f6edb8188876d4a91648d3abd76cfa73d406d4d43e8f164dd36a

  • Size

    14.7MB

  • Sample

    241226-xsbx6avrgm

  • MD5

    336993cb022096f6ec4044cadb51676a

  • SHA1

    6fa127155546efc0deb7eefdf2e34f1f262c96b3

  • SHA256

    588c821f2829f6edb8188876d4a91648d3abd76cfa73d406d4d43e8f164dd36a

  • SHA512

    4c7b4f0a3dca13badc86f5d31ced92a85cea244a196bbeff2840e3e036bd6aa51b28adee8bdb07aee4b9d945353a6a295e5863ac922c6a37d7a0efd428818c86

  • SSDEEP

    3072:FEtETlIcJpeAXch6LLTjjdQ4TdcUaOE9HBMwu6Z6O3Q7mKte7111111111111111:UEPX86zdndcfrHBgXfmKte

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      588c821f2829f6edb8188876d4a91648d3abd76cfa73d406d4d43e8f164dd36a

    • Size

      14.7MB

    • MD5

      336993cb022096f6ec4044cadb51676a

    • SHA1

      6fa127155546efc0deb7eefdf2e34f1f262c96b3

    • SHA256

      588c821f2829f6edb8188876d4a91648d3abd76cfa73d406d4d43e8f164dd36a

    • SHA512

      4c7b4f0a3dca13badc86f5d31ced92a85cea244a196bbeff2840e3e036bd6aa51b28adee8bdb07aee4b9d945353a6a295e5863ac922c6a37d7a0efd428818c86

    • SSDEEP

      3072:FEtETlIcJpeAXch6LLTjjdQ4TdcUaOE9HBMwu6Z6O3Q7mKte7111111111111111:UEPX86zdndcfrHBgXfmKte

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks