General

  • Target

    08304fe1beab272404d9e7441613eeedf83e7e1a3f11118ae8c51065f1b0493e

  • Size

    248KB

  • Sample

    201114-nw68y2e89x

  • MD5

    9aba262030cd07520b64b45e52de27e3

  • SHA1

    c786d8c586bec9121577025e9c83e58d41f7300e

  • SHA256

    08304fe1beab272404d9e7441613eeedf83e7e1a3f11118ae8c51065f1b0493e

  • SHA512

    af6ba281411a1b57d3282b0fa56b772c03ed6decd233e8f8105dee476a26955223d991796f87380818ac7c55e56dacdb69240f72b218d146845994ee62216e66

Malware Config

Targets

    • Target

      08304fe1beab272404d9e7441613eeedf83e7e1a3f11118ae8c51065f1b0493e

    • Size

      248KB

    • MD5

      9aba262030cd07520b64b45e52de27e3

    • SHA1

      c786d8c586bec9121577025e9c83e58d41f7300e

    • SHA256

      08304fe1beab272404d9e7441613eeedf83e7e1a3f11118ae8c51065f1b0493e

    • SHA512

      af6ba281411a1b57d3282b0fa56b772c03ed6decd233e8f8105dee476a26955223d991796f87380818ac7c55e56dacdb69240f72b218d146845994ee62216e66

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks