General

  • Target

    fa44c3d74032d310e5eb90bc9ae06088231806a236b67d1e85e3300423822608

  • Size

    11.1MB

  • Sample

    201115-eyh2cgrsaj

  • MD5

    c04ab4bb4248155df99df2836f64f423

  • SHA1

    18b0f2a014c60906b1ec632b50a086312cba9814

  • SHA256

    fa44c3d74032d310e5eb90bc9ae06088231806a236b67d1e85e3300423822608

  • SHA512

    08608cb9e8ad73f0e7c8e4214334ed53fc1a2ac5924b9c6f3d749ab14374edea119508fb54496808cb09b7eb9c75495dc85b5f367983890223d54ba407b550be

Malware Config

Targets

    • Target

      fa44c3d74032d310e5eb90bc9ae06088231806a236b67d1e85e3300423822608

    • Size

      11.1MB

    • MD5

      c04ab4bb4248155df99df2836f64f423

    • SHA1

      18b0f2a014c60906b1ec632b50a086312cba9814

    • SHA256

      fa44c3d74032d310e5eb90bc9ae06088231806a236b67d1e85e3300423822608

    • SHA512

      08608cb9e8ad73f0e7c8e4214334ed53fc1a2ac5924b9c6f3d749ab14374edea119508fb54496808cb09b7eb9c75495dc85b5f367983890223d54ba407b550be

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks