General

  • Target

    46120e1d214529118aa4215d8c856877

  • Size

    11.7MB

  • Sample

    201117-lhz5ey6a86

  • MD5

    cf99d6d2f10b9fef769e29dc9cabdc6d

  • SHA1

    69abee0ee47ce9ced0db790f39a9afb9b86ac8c8

  • SHA256

    6e325e8c95c86d290e1672117dd49a13f26d00efea9eba81979000d9478c66ef

  • SHA512

    bce3509d547691b7a7dc66d1b38f8cbb480edeae3ca46079a297cd746e3b18300eaa92b15207a16430600bfe962422c8bb33c62a3d4cefdcc60738f8d1d87137

Malware Config

Targets

    • Target

      46120e1d214529118aa4215d8c856877

    • Size

      11.7MB

    • MD5

      cf99d6d2f10b9fef769e29dc9cabdc6d

    • SHA1

      69abee0ee47ce9ced0db790f39a9afb9b86ac8c8

    • SHA256

      6e325e8c95c86d290e1672117dd49a13f26d00efea9eba81979000d9478c66ef

    • SHA512

      bce3509d547691b7a7dc66d1b38f8cbb480edeae3ca46079a297cd746e3b18300eaa92b15207a16430600bfe962422c8bb33c62a3d4cefdcc60738f8d1d87137

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks