General

  • Target

    7914e269d4b5bbc6d0f7b195e319de2467219b58334e4637aa06b6176afea206

  • Size

    10.1MB

  • Sample

    201115-v4z6ndfrqe

  • MD5

    229fce13dd32013ad5550ccd66cc9620

  • SHA1

    90630678b1100c0cdbc3100bdd91656ca6478399

  • SHA256

    7914e269d4b5bbc6d0f7b195e319de2467219b58334e4637aa06b6176afea206

  • SHA512

    53f7ed10967818c239508f91a0cd112a856331510a7ec7bc8898e4a636a634f09a9d1908ebaa489d6ef1f90a3144693154e44017e357d71f7dd06c73489f0be9

Malware Config

Targets

    • Target

      7914e269d4b5bbc6d0f7b195e319de2467219b58334e4637aa06b6176afea206

    • Size

      10.1MB

    • MD5

      229fce13dd32013ad5550ccd66cc9620

    • SHA1

      90630678b1100c0cdbc3100bdd91656ca6478399

    • SHA256

      7914e269d4b5bbc6d0f7b195e319de2467219b58334e4637aa06b6176afea206

    • SHA512

      53f7ed10967818c239508f91a0cd112a856331510a7ec7bc8898e4a636a634f09a9d1908ebaa489d6ef1f90a3144693154e44017e357d71f7dd06c73489f0be9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Tasks