General

  • Target

    f51e0dfab62c98ac8a15c80312e1ccadeba526be8caba8ed9a80f14a89b420a2

  • Size

    11.9MB

  • Sample

    201113-2x7kfy8br2

  • MD5

    9654ddf379a2487d9e914298a5793eb7

  • SHA1

    0bcb76ef01d5085380a5dfb959f061d6aae86765

  • SHA256

    f51e0dfab62c98ac8a15c80312e1ccadeba526be8caba8ed9a80f14a89b420a2

  • SHA512

    d662b168f8520df61973089618801719fc3503dbc0b75e2382543b7087801c433f7c6a717e0412c34563dd174158512f542e5efb8438f322e70d183128f6aa6a

Malware Config

Targets

    • Target

      f51e0dfab62c98ac8a15c80312e1ccadeba526be8caba8ed9a80f14a89b420a2

    • Size

      11.9MB

    • MD5

      9654ddf379a2487d9e914298a5793eb7

    • SHA1

      0bcb76ef01d5085380a5dfb959f061d6aae86765

    • SHA256

      f51e0dfab62c98ac8a15c80312e1ccadeba526be8caba8ed9a80f14a89b420a2

    • SHA512

      d662b168f8520df61973089618801719fc3503dbc0b75e2382543b7087801c433f7c6a717e0412c34563dd174158512f542e5efb8438f322e70d183128f6aa6a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks