General

  • Target

    e7cbfa5aae79143963b287f82b5897bf0131161937fbf040fa5785692afd4d85

  • Size

    14.2MB

  • Sample

    250103-xqt1ysykhs

  • MD5

    1a7967c2003e283817f70289b300ea43

  • SHA1

    5e68b49e7b17bf6873dd5b76a74f7bd8063d596e

  • SHA256

    e7cbfa5aae79143963b287f82b5897bf0131161937fbf040fa5785692afd4d85

  • SHA512

    725cd0e3073e708c3489710e25aa6c4715ff7933223cb1a03f47f36b8dcb30574fdc7e7bf5bbc9eed4c53cae2688bdfff6acf679ca4a7d9077a14e80df9dd5f1

  • SSDEEP

    3072:S1MBkxvfGaF/FzWb9VT5aLj/JSC5kJwSFjhvoGECaNwxAk8Je8Je8Je8Je8Je8Jl:Jk5FOkjRSC6SS+N+

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      e7cbfa5aae79143963b287f82b5897bf0131161937fbf040fa5785692afd4d85

    • Size

      14.2MB

    • MD5

      1a7967c2003e283817f70289b300ea43

    • SHA1

      5e68b49e7b17bf6873dd5b76a74f7bd8063d596e

    • SHA256

      e7cbfa5aae79143963b287f82b5897bf0131161937fbf040fa5785692afd4d85

    • SHA512

      725cd0e3073e708c3489710e25aa6c4715ff7933223cb1a03f47f36b8dcb30574fdc7e7bf5bbc9eed4c53cae2688bdfff6acf679ca4a7d9077a14e80df9dd5f1

    • SSDEEP

      3072:S1MBkxvfGaF/FzWb9VT5aLj/JSC5kJwSFjhvoGECaNwxAk8Je8Je8Je8Je8Je8Jl:Jk5FOkjRSC6SS+N+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks