General

  • Target

    354b570754a39b62f08fa243e04e0ac4

  • Size

    11.8MB

  • Sample

    201214-15g8sn61m6

  • MD5

    354b570754a39b62f08fa243e04e0ac4

  • SHA1

    9662324cd2f8a2f1600ba42b64cf14b30d05b57f

  • SHA256

    65b06139254e9d7ad3e56e67b498473d31abb7e8b9a32a1a537fd9ec607232ff

  • SHA512

    b5e315aaec0e8b6d4968110cbb73d344a371410e6d7b879145156895823eeed9fda7430c39a2b9f87451fb70fc44d41bfd6e651d11d53cbe70637134f0dd24b6

Malware Config

Targets

    • Target

      354b570754a39b62f08fa243e04e0ac4

    • Size

      11.8MB

    • MD5

      354b570754a39b62f08fa243e04e0ac4

    • SHA1

      9662324cd2f8a2f1600ba42b64cf14b30d05b57f

    • SHA256

      65b06139254e9d7ad3e56e67b498473d31abb7e8b9a32a1a537fd9ec607232ff

    • SHA512

      b5e315aaec0e8b6d4968110cbb73d344a371410e6d7b879145156895823eeed9fda7430c39a2b9f87451fb70fc44d41bfd6e651d11d53cbe70637134f0dd24b6

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks