• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Turla NetTrans Malware
September 23, 2019
Rewterz Threat Alert – ATM’s Targeted via North Korean Malware ATMDtrack
September 24, 2019

Rewterz Threat Alert – Tofsee Malware Resurfaces with Fresh IoCs

September 23, 2019

Severity

Medium

Analysis Summary

Tofsee malware has been around since 2016. It is used for sending spam messages, conducting click fraud, mining crypto-currency etc. When executed, the malware is capable of making changes to the settings on affected systems and exfiltrating information. It can track users online activities, steal personal information and credentials, and changing browser and DNS settings. Tofsee can be distributed via email as attachments or by bundling it with other programs.
Indicators of compromise are given below.

Impact

  • Information theft
  • Credential theft
  • Crypto-mining

Indicators of Compromise

Malware Hash (MD5/SHA1/SH256)

  • f3c57401b184dca3b93b0922fc09e77a
  • de94cf46b08aacfaef918efddcf2c48a
  • b91c979352ce4514654c25c11824187b
  • b9e6454a3057834d0c7141fe14593494
  • 18751e887e193bc99a7f62f105a665ad
  • d86b2f98d80e7671bae99dbe1fbb1433
  • df8944b9de98eaa3f7c06d398218e825
  • 1b7d0705c538927c8b76f638c288013e
  • ea464aad5955b6aa1dfe458679f5d9ab
  • 6d1233453b64a7496bdfeaa52219e25b
  • 6103b79e3ae60564d3a3e0a3f6d5b270
  • 313a4b27e4543ed43dcd570ec17c0232
  • 70ab33bcd971dbef50fd6a76b5271f40
  • 26a7708585dc7086162c128a0b712239
  • 4d9c87f4729d67443cdf2d1f13d36733

Remediation

  • Block the threat indicators at your respective controls.
  • Always scan downloaded files before executing them.
  • Do not download email attachments coming from untrusted sources.
  • Keep all software updated to the latest patched versions.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.