General

  • Target

    31f4230adbbce38a80578c79102b0a1c0df240920d84f3335a4aab3fb6c6dc96.exe

  • Size

    94KB

  • Sample

    250107-mdcwsswrh1

  • MD5

    dc6a56c47497bf22da1da256075b2b96

  • SHA1

    9a4bbe3919610a967d4d58753c3c8750f849e20f

  • SHA256

    31f4230adbbce38a80578c79102b0a1c0df240920d84f3335a4aab3fb6c6dc96

  • SHA512

    f2019729557b4cd03e6653a72f8e9bf4e53fafa662224af84478d3e8d7268cddd3b476c4ce61221b23d249b451b874f52225a0a289835b5307e0751a161acd39

  • SSDEEP

    1536:HaT5HC7L9vnEexvevA17dfTWmU6WmQt8upcr/dF:HaT5aLaexbditRtsrFF

Malware Config

Extracted

Family

tofsee

C2

91.218.38.211

188.130.237.71

185.25.48.10

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      31f4230adbbce38a80578c79102b0a1c0df240920d84f3335a4aab3fb6c6dc96.exe

    • Size

      94KB

    • MD5

      dc6a56c47497bf22da1da256075b2b96

    • SHA1

      9a4bbe3919610a967d4d58753c3c8750f849e20f

    • SHA256

      31f4230adbbce38a80578c79102b0a1c0df240920d84f3335a4aab3fb6c6dc96

    • SHA512

      f2019729557b4cd03e6653a72f8e9bf4e53fafa662224af84478d3e8d7268cddd3b476c4ce61221b23d249b451b874f52225a0a289835b5307e0751a161acd39

    • SSDEEP

      1536:HaT5HC7L9vnEexvevA17dfTWmU6WmQt8upcr/dF:HaT5aLaexbditRtsrFF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks