General

  • Target

    e19af916ee2e230b6beafbb6d5c84354947cb03a0aa08754f1d43edb2f88cf08

  • Size

    12.5MB

  • Sample

    201114-5n76fbyr7e

  • MD5

    5eec15d95c50d4247f92c621b156ef62

  • SHA1

    a9c2a4b270e2ff09293c4c4454c746058124bd8b

  • SHA256

    e19af916ee2e230b6beafbb6d5c84354947cb03a0aa08754f1d43edb2f88cf08

  • SHA512

    d1472a79531a2ec9fc32492305729eb9812fbaa3b364d8612bb82eed384ea7ca0406a0d78e4fff2c7eb510d8eb5276c9552c3d9c8d9c584900ab2cddbe53da53

Malware Config

Targets

    • Target

      e19af916ee2e230b6beafbb6d5c84354947cb03a0aa08754f1d43edb2f88cf08

    • Size

      12.5MB

    • MD5

      5eec15d95c50d4247f92c621b156ef62

    • SHA1

      a9c2a4b270e2ff09293c4c4454c746058124bd8b

    • SHA256

      e19af916ee2e230b6beafbb6d5c84354947cb03a0aa08754f1d43edb2f88cf08

    • SHA512

      d1472a79531a2ec9fc32492305729eb9812fbaa3b364d8612bb82eed384ea7ca0406a0d78e4fff2c7eb510d8eb5276c9552c3d9c8d9c584900ab2cddbe53da53

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks