General

  • Target

    1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc

  • Size

    15.0MB

  • Sample

    250106-zckw8syqcr

  • MD5

    f480f6c7401bffe8b0f86af3ebcd0182

  • SHA1

    af882623b8c62e80b69fe4b2d5841be744364665

  • SHA256

    1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc

  • SHA512

    84f00f4a7a2ad086a4f9fae8c08d854db6ec9c5df2feca1a4c76d01a5726522e86123d85e81fe01fdaca7569ff35805438ce0fa398a6e1e6a5c424c10eae00a6

  • SSDEEP

    24576:PCoZopQ3TmLgqkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkP:Ksjms

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc

    • Size

      15.0MB

    • MD5

      f480f6c7401bffe8b0f86af3ebcd0182

    • SHA1

      af882623b8c62e80b69fe4b2d5841be744364665

    • SHA256

      1868c1cbcb3587d158d0465a1a6f7abfe8af106aef076ceb916e746a0d184adc

    • SHA512

      84f00f4a7a2ad086a4f9fae8c08d854db6ec9c5df2feca1a4c76d01a5726522e86123d85e81fe01fdaca7569ff35805438ce0fa398a6e1e6a5c424c10eae00a6

    • SSDEEP

      24576:PCoZopQ3TmLgqkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkP:Ksjms

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks