MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f140797fa904582e8422edd3bc1c661b72a1a1ee23a329173017e20901e25ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments 1

SHA256 hash: 4f140797fa904582e8422edd3bc1c661b72a1a1ee23a329173017e20901e25ca
SHA3-384 hash: f28ed673cedc8cbc0dc699ae99b61829a94463af4b0fc835b903a7b38030fb89a2b713b2b1179a1d5d587759906749f2
SHA1 hash: 73a88c1712d1c91731f7557c4a023b1599c5ac6c
MD5 hash: e7f606299a819430be235ed185050de1
humanhash: iowa-alpha-twelve-fourteen
File name:e7f606299a819430be235ed185050de1
Download: download sample
Signature Tofsee
File size:322'048 bytes
First seen:2021-11-28 17:37:26 UTC
Last seen:2021-11-28 19:38:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3f0b538abbe574275afcdf5200fd4d28 (2 x RedLineStealer, 1 x Tofsee, 1 x ArkeiStealer)
ssdeep 6144:AxDST8m6GgAS/bMEDr6dYW+SXuZet0ySwJA2py2KithNTye70s:IGgtzMEDr6dYW+SXuZet0ySwJw2RHTxo
Threatray 179 similar samples on MalwareBazaar
TLSH T125648E1C67A0C438F4B746B899B9D3B9793E79A16B2890CF52D117EE56396E0DC3030B
File icon (PE):PE icon
dhash icon 5012b0f068696c46 (2 x Smoke Loader, 1 x CryptBot, 1 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe Tofsee

Intelligence


File Origin
# of uploads :
2
# of downloads :
726
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e7f606299a819430be235ed185050de1
Verdict:
Malicious activity
Analysis date:
2021-11-28 17:39:20 UTC
Tags:
trojan tofsee miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Launching the process to change the firewall settings
Creating a process from a recently created file
Creating a service
Launching a service
Launching the default Windows debugger (dwwin.exe)
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 529943 Sample: lYzhcZkVjT Startdate: 28/11/2021 Architecture: WINDOWS Score: 100 51 microsoft-com.mail.protection.outlook.com 2->51 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 Antivirus detection for dropped file 2->61 63 9 other signatures 2->63 8 sxwukqzo.exe 2->8         started        11 lYzhcZkVjT.exe 2 2->11         started        14 svchost.exe 2->14         started        16 6 other processes 2->16 signatures3 process4 file5 69 Detected unpacking (changes PE section rights) 8->69 71 Detected unpacking (overwrites its own PE header) 8->71 73 Writes to foreign memory regions 8->73 81 2 other signatures 8->81 18 svchost.exe 1 8->18         started        49 C:\Users\user\AppData\Local\...\sxwukqzo.exe, PE32 11->49 dropped 75 Uses netsh to modify the Windows network and firewall settings 11->75 77 Modifies the windows firewall 11->77 22 cmd.exe 1 11->22         started        25 netsh.exe 3 11->25         started        27 cmd.exe 2 11->27         started        31 3 other processes 11->31 79 Changes security center settings (notifications, updates, antivirus, firewall) 14->79 29 MpCmdRun.exe 1 14->29         started        signatures6 process7 dnsIp8 53 quadoil.ru 185.231.245.147, 443, 49751, 49789 TEAM-HOSTASRU Russian Federation 18->53 55 microsoft-com.mail.protection.outlook.com 104.47.53.36, 25, 49750 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->55 65 System process connects to network (likely due to code injection or exploit) 18->65 67 Deletes itself after installation 18->67 47 C:\Windows\SysWOW64\...\sxwukqzo.exe (copy), PE32 22->47 dropped 33 conhost.exe 22->33         started        35 conhost.exe 25->35         started        37 conhost.exe 27->37         started        39 conhost.exe 29->39         started        41 conhost.exe 31->41         started        43 conhost.exe 31->43         started        45 conhost.exe 31->45         started        file9 signatures10 process11
Threat name:
Win32.Backdoor.Tofsee
Status:
Malicious
First seen:
2021-11-27 11:29:21 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
29 of 45 (64.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:tofsee family:xmrig evasion miner persistence trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Creates new service(s)
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
XMRig Miner Payload
Tofsee
Windows security bypass
xmrig
Malware Config
C2 Extraction:
quadoil.ru
lakeflex.ru
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_tofsee_w0
Author:akrasuski1

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Tofsee

Executable exe 4f140797fa904582e8422edd3bc1c661b72a1a1ee23a329173017e20901e25ca

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-28 17:37:27 UTC

url : hxxp://192.162.246.70/6.php