General

  • Target

    9d71a3a135f9e3b9de7024d85f1c59f809796db6114974236462740f262c6c83

  • Size

    14.9MB

  • Sample

    201115-zdvldrb5hn

  • MD5

    8d70d33692835a054cc3d98b593dd05a

  • SHA1

    bf1cec9d3ab53be4827076e2d15313e6fe8e99e6

  • SHA256

    9d71a3a135f9e3b9de7024d85f1c59f809796db6114974236462740f262c6c83

  • SHA512

    cf9536aea51c3d22385323ea4401d55570dd3235daf202d9775c4d3c223e38d56e48c20e07858f2ce086d080dad1cf5a19a1abd590b3728794775609a9f7996f

Malware Config

Targets

    • Target

      9d71a3a135f9e3b9de7024d85f1c59f809796db6114974236462740f262c6c83

    • Size

      14.9MB

    • MD5

      8d70d33692835a054cc3d98b593dd05a

    • SHA1

      bf1cec9d3ab53be4827076e2d15313e6fe8e99e6

    • SHA256

      9d71a3a135f9e3b9de7024d85f1c59f809796db6114974236462740f262c6c83

    • SHA512

      cf9536aea51c3d22385323ea4401d55570dd3235daf202d9775c4d3c223e38d56e48c20e07858f2ce086d080dad1cf5a19a1abd590b3728794775609a9f7996f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Tasks