General

  • Target

    0d3ce00823f9490ec470493500673f945da375ea1dd622e86783829addddf8ad

  • Size

    13.7MB

  • Sample

    201113-9v536spkxx

  • MD5

    fda9e1665332053cf72950e2d2d275ec

  • SHA1

    5dd4642ac084b089ffae47d16933776338396eeb

  • SHA256

    0d3ce00823f9490ec470493500673f945da375ea1dd622e86783829addddf8ad

  • SHA512

    24a2fc5e75e32461986668b7ada7cf2b21a01e45114d92c792196e3789fa198407a864b7c8df9f3b36bd1497728932de0bc3ed9bfbc5e69407fc8edb34345e1b

Malware Config

Targets

    • Target

      0d3ce00823f9490ec470493500673f945da375ea1dd622e86783829addddf8ad

    • Size

      13.7MB

    • MD5

      fda9e1665332053cf72950e2d2d275ec

    • SHA1

      5dd4642ac084b089ffae47d16933776338396eeb

    • SHA256

      0d3ce00823f9490ec470493500673f945da375ea1dd622e86783829addddf8ad

    • SHA512

      24a2fc5e75e32461986668b7ada7cf2b21a01e45114d92c792196e3789fa198407a864b7c8df9f3b36bd1497728932de0bc3ed9bfbc5e69407fc8edb34345e1b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks