General

  • Target

    2768749b68bcc2a0d4aa791246d1d12e

  • Size

    12.3MB

  • Sample

    201214-3vcbxte7es

  • MD5

    2768749b68bcc2a0d4aa791246d1d12e

  • SHA1

    8d8d43003be29ed3f02e44913227871a2dfa7d8d

  • SHA256

    cd0838375b76d23ee905b240e836d66d63840a788b019cff3ef68a7691dbc2fe

  • SHA512

    90553c7e6d24e338db0f6088d77a48b5992dfaa6eb9134c33367041526048b9207ead757b5b7ed876ac4512661b451049228c776e19e39a376e9dea57c4a2b5c

Malware Config

Targets

    • Target

      2768749b68bcc2a0d4aa791246d1d12e

    • Size

      12.3MB

    • MD5

      2768749b68bcc2a0d4aa791246d1d12e

    • SHA1

      8d8d43003be29ed3f02e44913227871a2dfa7d8d

    • SHA256

      cd0838375b76d23ee905b240e836d66d63840a788b019cff3ef68a7691dbc2fe

    • SHA512

      90553c7e6d24e338db0f6088d77a48b5992dfaa6eb9134c33367041526048b9207ead757b5b7ed876ac4512661b451049228c776e19e39a376e9dea57c4a2b5c

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks