MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a755c3fa92a24bae2d0d3fc1e2a743ed11e159f3327aeb685f8118823453a59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 5a755c3fa92a24bae2d0d3fc1e2a743ed11e159f3327aeb685f8118823453a59
SHA3-384 hash: 8991b1af9ecd4f2d6e67cdef0290bf8144ca559ae068b0b2fd9655e6fc0da59eec13b1322eae010e143bd0660c1823f8
SHA1 hash: edf064f4b9233f7eb4f0c83a5cdb9cdd568278ea
MD5 hash: d4d66258546efbcc87356f6ecfa0e925
humanhash: fruit-india-floor-triple
File name:d4d66258546efbcc87356f6ecfa0e925.exe
Download: download sample
Signature Tofsee
File size:172'544 bytes
First seen:2021-08-28 19:50:47 UTC
Last seen:2021-08-28 21:07:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 065a584d0d50807005a7c41fcb9adea6 (6 x RaccoonStealer, 2 x RedLineStealer, 1 x DanaBot)
ssdeep 3072:aZmgrmSXo03dk1a+5EA7t9DU+jRHwhZoWC9sI5/DuT61m:ir/XoglyHHwhZU9sI5/
Threatray 4'010 similar samples on MalwareBazaar
TLSH T1AFF3BE0436B0C57BF9C5093444E9EB91EA3BF8F36A75424B3654176F3E212C0562EAD7
dhash icon 4839b2b0e8c38890 (105 x RaccoonStealer, 38 x Smoke Loader, 33 x RedLineStealer)
Reporter abuse_ch
Tags:exe Tofsee


Avatar
abuse_ch
Tofsee C2:
http://84.246.85.16/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://84.246.85.16/ https://threatfox.abuse.ch/ioc/201706/

Intelligence


File Origin
# of uploads :
2
# of downloads :
654
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d4d66258546efbcc87356f6ecfa0e925.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-28 19:52:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Moving a file to the Windows subdirectory
Launching a process
Sending a custom TCP request
Creating a service
Launching a service
Deleting a recently created file
Launching the default Windows debugger (dwwin.exe)
Launching the process to change the firewall settings
Creating a file
Connection attempt to an infection source
Creating a file in the Windows subdirectories
Reading critical registry keys
Unauthorized injection to a recently created process
Enabling autorun for a service
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Forced shutdown of a system process
Sending a TCP request to an infection source
Stealing user critical data
Deleting of the original file
Enabling autorun by creating a file
Unauthorized injection to a system process
Adding exclusions to Windows Defender
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon RedLine SmokeLoader Tofsee Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Creates files in alternative data streams (ADS)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 473275 Sample: Fh6agmYian.exe Startdate: 28/08/2021 Architecture: WINDOWS Score: 100 94 icloud.com 2->94 96 geoiptool.com 2->96 98 32 other IPs or domains 2->98 134 Multi AV Scanner detection for domain / URL 2->134 136 Malicious sample detected (through community Yara rule) 2->136 138 Antivirus detection for URL or domain 2->138 144 21 other signatures 2->144 11 Fh6agmYian.exe 2->11         started        14 tyumknz.exe 2->14         started        16 cajaetc 2->16         started        18 11 other processes 2->18 signatures3 140 Tries to resolve many domain names, but no domain seems valid 94->140 142 May check the online IP address of the machine 96->142 process4 dnsIp5 188 Detected unpacking (changes PE section rights) 11->188 190 Contains functionality to inject code into remote processes 11->190 192 Injects a PE file into a foreign processes 11->192 21 Fh6agmYian.exe 11->21         started        194 Writes to foreign memory regions 14->194 196 Allocates memory in foreign processes 14->196 24 svchost.exe 14->24         started        198 Machine Learning detection for dropped file 16->198 28 cajaetc 16->28         started        100 127.0.0.1 unknown unknown 18->100 102 192.168.2.1 unknown unknown 18->102 104 2 other IPs or domains 18->104 200 System process connects to network (likely due to code injection or exploit) 18->200 202 May check the online IP address of the machine 18->202 204 Changes security center settings (notifications, updates, antivirus, firewall) 18->204 signatures6 process7 dnsIp8 172 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->172 174 Maps a DLL or memory area into another process 21->174 176 Checks if the current machine is a virtual machine (disk enumeration) 21->176 30 explorer.exe 30 21->30 injected 106 ansoniasystems.com 24->106 108 41.52.17.84.zen.spamhaus.org 24->108 110 27 other IPs or domains 24->110 82 C:\Windows\SysWOW64\...\systemprofile:.repos, data 24->82 dropped 178 System process connects to network (likely due to code injection or exploit) 24->178 180 Creates files in alternative data streams (ADS) 24->180 182 Injects a PE file into a foreign processes 24->182 184 Creates a thread in another existing process (thread injection) 28->184 file9 signatures10 process11 dnsIp12 118 readinglistforaugust7.xyz 30->118 120 readinglistforaugust6.xyz 30->120 122 10 other IPs or domains 30->122 86 C:\Users\user\AppData\Roaming\cajaetc, PE32 30->86 dropped 88 C:\Users\user\AppData\Local\Temp\FF32.exe, PE32 30->88 dropped 90 C:\Users\user\AppData\Local\Temp\BAE.exe, PE32 30->90 dropped 92 12 other files (11 malicious) 30->92 dropped 124 System process connects to network (likely due to code injection or exploit) 30->124 126 Benign windows process drops PE files 30->126 128 Performs DNS queries to domains with low reputation 30->128 132 2 other signatures 30->132 35 50F.exe 2 30->35         started        39 1B7F.exe 30->39         started        41 3254.exe 30->41         started        43 5 other processes 30->43 file13 130 Tries to resolve many domain names, but no domain seems valid 120->130 signatures14 process15 dnsIp16 78 C:\Users\user\AppData\Local\...\tyumknz.exe, PE32 35->78 dropped 146 Detected unpacking (changes PE section rights) 35->146 148 Machine Learning detection for dropped file 35->148 150 Uses netsh to modify the Windows network and firewall settings 35->150 152 Modifies the windows firewall 35->152 46 cmd.exe 35->46         started        49 cmd.exe 35->49         started        51 sc.exe 35->51         started        62 3 other processes 35->62 154 Multi AV Scanner detection for dropped file 39->154 156 Query firmware table information (likely to detect VMs) 39->156 158 Hides threads from debuggers 39->158 53 conhost.exe 39->53         started        160 Tries to detect sandboxes and other dynamic analysis tools (window names) 41->160 162 Tries to detect sandboxes / dynamic malware analysis system (registry check) 41->162 112 telete.in 195.201.225.248, 443, 49717 HETZNER-ASDE Germany 43->112 114 84.246.85.16, 49718, 80 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese unknown 43->114 116 2 other IPs or domains 43->116 80 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 43->80 dropped 164 Contains functionality to steal Internet Explorer form passwords 43->164 166 Tries to harvest and steal browser information (history, passwords, etc) 43->166 168 Sample uses process hollowing technique 43->168 170 Injects a PE file into a foreign processes 43->170 55 conhost.exe 43->55         started        58 WerFault.exe 43->58         started        60 B2A.exe 43->60         started        64 3 other processes 43->64 file17 signatures18 process19 file20 84 C:\Windows\SysWOW64\...\tyumknz.exe (copy), PE32 46->84 dropped 66 conhost.exe 46->66         started        68 conhost.exe 49->68         started        70 conhost.exe 51->70         started        186 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 55->186 72 conhost.exe 62->72         started        74 conhost.exe 62->74         started        76 conhost.exe 62->76         started        signatures21 process22
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-08-28 19:51:04 UTC
AV detection:
21 of 42 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:bitrat family:buran family:raccoon family:redline family:smokeloader family:stormkitty family:tofsee family:xmrig botnet:1000 botnet:fe582536ec580228180f270f7cb80a867860e010 botnet:mix botnet:sergey botnet:superstar75737 botnet:word1 backdoor discovery evasion infostealer miner persistence ransomware rat spyware stealer suricata themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Interacts with shadow copies
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Drops desktop.ini file(s)
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
UPX packed file
Async RAT payload
Deletes shadow copies
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
AsyncRat
BitRAT
BitRAT Payload
Buran
Raccoon
RedLine
RedLine Payload
SmokeLoader
StormKitty
StormKitty Payload
Tofsee
Windows security bypass
suricata: ET MALWARE StormKitty Data Exfil via Telegram
xmrig
Malware Config
C2 Extraction:
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
51.254.68.139:15009
94.26.249.88:1902
manazyxsa.xyz:80
95.181.152.190:33007
94.103.9.138:80
Unpacked files
SH256 hash:
0a9a7acf77fe4f890fe2acf761fa7f369418bb1f733504acd0792f589ccc7b15
MD5 hash:
ad94a86355be2ad9348b88e8972e8320
SHA1 hash:
8c7ff71739a5194efc5c7bee9c37ad92a9e72646
SH256 hash:
5a755c3fa92a24bae2d0d3fc1e2a743ed11e159f3327aeb685f8118823453a59
MD5 hash:
d4d66258546efbcc87356f6ecfa0e925
SHA1 hash:
edf064f4b9233f7eb4f0c83a5cdb9cdd568278ea
Malware family:
AsyncRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Tofsee

Executable exe 5a755c3fa92a24bae2d0d3fc1e2a743ed11e159f3327aeb685f8118823453a59

(this sample)

  
Delivery method
Distributed via web download

Comments