General

  • Target

    22234f7ae48123684dfefbddfba6366a30921f206538cdd711edec183fe5698e

  • Size

    12.0MB

  • Sample

    201115-wa1ejah46x

  • MD5

    9046e0f1111ff8c34b1598a691310ad3

  • SHA1

    f92697edc38988eff90847b3ff7df81a97b37cdb

  • SHA256

    22234f7ae48123684dfefbddfba6366a30921f206538cdd711edec183fe5698e

  • SHA512

    9eff5999ddfc199b276425e0f2fe2cabe11873229b802567d27991fd14b3939bcd5da95e9daca191e697560ffd2e6089660ecf6e09e59c940d656436f9071664

Malware Config

Targets

    • Target

      22234f7ae48123684dfefbddfba6366a30921f206538cdd711edec183fe5698e

    • Size

      12.0MB

    • MD5

      9046e0f1111ff8c34b1598a691310ad3

    • SHA1

      f92697edc38988eff90847b3ff7df81a97b37cdb

    • SHA256

      22234f7ae48123684dfefbddfba6366a30921f206538cdd711edec183fe5698e

    • SHA512

      9eff5999ddfc199b276425e0f2fe2cabe11873229b802567d27991fd14b3939bcd5da95e9daca191e697560ffd2e6089660ecf6e09e59c940d656436f9071664

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks