General

  • Target

    77321567006d0c5b5151682598cea932311e475cd6d015bdec055fcc59cf99db

  • Size

    12.6MB

  • Sample

    241230-ykjtgaylew

  • MD5

    dd179af0f87ef059908150114b34696c

  • SHA1

    b5f2f36cda105ff9f2869142ed016f8cfda43fdf

  • SHA256

    77321567006d0c5b5151682598cea932311e475cd6d015bdec055fcc59cf99db

  • SHA512

    4b4561eb56307074705de068d2034ea68ae2d145efbcab7bcd3f0da77a29c50905bf52a5378529a2299b0da1ae90961f2a475cdcbe6d2219d9ab6c5ea1ce3642

  • SSDEEP

    3072:EEtETlIcJpeAXch6LLTjjdQ4TdcUaOE9HBMwu6Z6O3Q7mKte711111111111111n:FEPX86zdndcfrHBgXfmKte

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      77321567006d0c5b5151682598cea932311e475cd6d015bdec055fcc59cf99db

    • Size

      12.6MB

    • MD5

      dd179af0f87ef059908150114b34696c

    • SHA1

      b5f2f36cda105ff9f2869142ed016f8cfda43fdf

    • SHA256

      77321567006d0c5b5151682598cea932311e475cd6d015bdec055fcc59cf99db

    • SHA512

      4b4561eb56307074705de068d2034ea68ae2d145efbcab7bcd3f0da77a29c50905bf52a5378529a2299b0da1ae90961f2a475cdcbe6d2219d9ab6c5ea1ce3642

    • SSDEEP

      3072:EEtETlIcJpeAXch6LLTjjdQ4TdcUaOE9HBMwu6Z6O3Q7mKte711111111111111n:FEPX86zdndcfrHBgXfmKte

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks