General

  • Target

    9ce8b01c8cfe2020ab11819ff80c747a040698f83613d6dc43b71e09b984961cN.exe

  • Size

    186KB

  • Sample

    250104-s1a9davqaw

  • MD5

    166c6ac61a149f3d397c5b54cdf611b0

  • SHA1

    51ac25392072ea5bd9af9d6d227c0c13a5c7cfdc

  • SHA256

    9ce8b01c8cfe2020ab11819ff80c747a040698f83613d6dc43b71e09b984961c

  • SHA512

    06d93630a7cf01e119c2cecf9c28de3f8e88b55f0afde93f2d6b8c536efd1ada9e9678aac34cb20c75911a3254ca3de174420a9ff45dbf2b4192c17d2b6ccfba

  • SSDEEP

    3072:L7ojA4DTPi7C4QCDla6Iv0vdJxfez43Valiy1wC3pZa9uD6Vdyhk9:+A4DTPi7C4QBVviXVIQC3wVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      9ce8b01c8cfe2020ab11819ff80c747a040698f83613d6dc43b71e09b984961cN.exe

    • Size

      186KB

    • MD5

      166c6ac61a149f3d397c5b54cdf611b0

    • SHA1

      51ac25392072ea5bd9af9d6d227c0c13a5c7cfdc

    • SHA256

      9ce8b01c8cfe2020ab11819ff80c747a040698f83613d6dc43b71e09b984961c

    • SHA512

      06d93630a7cf01e119c2cecf9c28de3f8e88b55f0afde93f2d6b8c536efd1ada9e9678aac34cb20c75911a3254ca3de174420a9ff45dbf2b4192c17d2b6ccfba

    • SSDEEP

      3072:L7ojA4DTPi7C4QCDla6Iv0vdJxfez43Valiy1wC3pZa9uD6Vdyhk9:+A4DTPi7C4QBVviXVIQC3wVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks