General

  • Target

    e320e9158f1115e87a45c1522d991f35

  • Size

    13.1MB

  • Sample

    201214-1lrzkpl686

  • MD5

    e320e9158f1115e87a45c1522d991f35

  • SHA1

    90599b05515da87abcfa9d9c0c5bc34dc95c5f29

  • SHA256

    1e17db166633efe330e5c92cf25697a80139cfd3af8e94a82dbf3c45dcaf8826

  • SHA512

    671e94a0cd724a1dea13bb9d3f276630ee3e0758810087c38d3e59b8294f552cecb97f858255173c991e764d33ead9330faaca345ae87688471c1c44da1778a1

Malware Config

Targets

    • Target

      e320e9158f1115e87a45c1522d991f35

    • Size

      13.1MB

    • MD5

      e320e9158f1115e87a45c1522d991f35

    • SHA1

      90599b05515da87abcfa9d9c0c5bc34dc95c5f29

    • SHA256

      1e17db166633efe330e5c92cf25697a80139cfd3af8e94a82dbf3c45dcaf8826

    • SHA512

      671e94a0cd724a1dea13bb9d3f276630ee3e0758810087c38d3e59b8294f552cecb97f858255173c991e764d33ead9330faaca345ae87688471c1c44da1778a1

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks