General

  • Target

    2d2164bac6935ba3b38573e69f323ec242b3a259ecb06396964f57e3c93d7c6eN.exe

  • Size

    355KB

  • Sample

    241231-kdf74ssjg1

  • MD5

    4ade9bccd0b2b9447ff9dbb9c3880830

  • SHA1

    52aef011732da2f9fea1ee555d370a119749ccd0

  • SHA256

    2d2164bac6935ba3b38573e69f323ec242b3a259ecb06396964f57e3c93d7c6e

  • SHA512

    06103380806a02eb19d3f102d6b69f43f3483dc1db6fa48ca53ec8d077b4a6fa35dbb1fc6c438c51ef45f10765a06d2497b0f8d38ae8ac8049106f1bd99c33e1

  • SSDEEP

    6144:hvo5HY2USvj5R/i2gCiX0oH1VmyerYDn1QqaFZczX3V5wRjejHH5TAb:hA5HY2USr5R/i2gCy0oVVmyerK1/aFZp

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      2d2164bac6935ba3b38573e69f323ec242b3a259ecb06396964f57e3c93d7c6eN.exe

    • Size

      355KB

    • MD5

      4ade9bccd0b2b9447ff9dbb9c3880830

    • SHA1

      52aef011732da2f9fea1ee555d370a119749ccd0

    • SHA256

      2d2164bac6935ba3b38573e69f323ec242b3a259ecb06396964f57e3c93d7c6e

    • SHA512

      06103380806a02eb19d3f102d6b69f43f3483dc1db6fa48ca53ec8d077b4a6fa35dbb1fc6c438c51ef45f10765a06d2497b0f8d38ae8ac8049106f1bd99c33e1

    • SSDEEP

      6144:hvo5HY2USvj5R/i2gCiX0oH1VmyerYDn1QqaFZczX3V5wRjejHH5TAb:hA5HY2USr5R/i2gCy0oVVmyerK1/aFZp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks