General

  • Target

    e013a3489975a5882a5850a9456cdeeaa7cc6dddd8b9de6345e8415d85d2a150

  • Size

    13.6MB

  • Sample

    201114-et473qn58x

  • MD5

    3fa3e938a79aa0a39bbe02f31dd689ff

  • SHA1

    4c144efabc0b14588f32c93f1fc30165a00d31c9

  • SHA256

    e013a3489975a5882a5850a9456cdeeaa7cc6dddd8b9de6345e8415d85d2a150

  • SHA512

    d5eaf06e1a574658dd9fc06b412414c7e7d9623d8a1792eedc7a6144d1829563d79fb6b3206bc42e4eee4c0e4e788386617a6b0781e2217aa9edeb2cb240e651

Malware Config

Targets

    • Target

      e013a3489975a5882a5850a9456cdeeaa7cc6dddd8b9de6345e8415d85d2a150

    • Size

      13.6MB

    • MD5

      3fa3e938a79aa0a39bbe02f31dd689ff

    • SHA1

      4c144efabc0b14588f32c93f1fc30165a00d31c9

    • SHA256

      e013a3489975a5882a5850a9456cdeeaa7cc6dddd8b9de6345e8415d85d2a150

    • SHA512

      d5eaf06e1a574658dd9fc06b412414c7e7d9623d8a1792eedc7a6144d1829563d79fb6b3206bc42e4eee4c0e4e788386617a6b0781e2217aa9edeb2cb240e651

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks