General

  • Target

    0877a5f9da479c4c01f7773e9a37c88df7313447330fe2fe17f745fa496cccad

  • Size

    12.1MB

  • Sample

    250105-yrbrfawqfk

  • MD5

    303f6e51c43fac701d5f42ef5bf75390

  • SHA1

    8579db92117e98aab6ea6c8386044b9dac29f751

  • SHA256

    0877a5f9da479c4c01f7773e9a37c88df7313447330fe2fe17f745fa496cccad

  • SHA512

    0ef6f8304325be021264f08f7458dc7ef01c65ab8ee9b64455a27af47bbff9177648e5b6c4c2bb1d29e42205ff20987836ec32ffd23f5fd4c22bd4570e57689d

  • SSDEEP

    6144:vZDhTWrhgUaxjFftGu35QZ+2PPFGrGuislc03r:vZDhTWrhgUWFfMuP0FGqb/0

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      0877a5f9da479c4c01f7773e9a37c88df7313447330fe2fe17f745fa496cccad

    • Size

      12.1MB

    • MD5

      303f6e51c43fac701d5f42ef5bf75390

    • SHA1

      8579db92117e98aab6ea6c8386044b9dac29f751

    • SHA256

      0877a5f9da479c4c01f7773e9a37c88df7313447330fe2fe17f745fa496cccad

    • SHA512

      0ef6f8304325be021264f08f7458dc7ef01c65ab8ee9b64455a27af47bbff9177648e5b6c4c2bb1d29e42205ff20987836ec32ffd23f5fd4c22bd4570e57689d

    • SSDEEP

      6144:vZDhTWrhgUaxjFftGu35QZ+2PPFGrGuislc03r:vZDhTWrhgUWFfMuP0FGqb/0

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks