General

  • Target

    8129457fa7210937a1467a21f241b201

  • Size

    14.3MB

  • Sample

    201214-592nl8beaj

  • MD5

    8129457fa7210937a1467a21f241b201

  • SHA1

    f5013dad172969224076ca791692ac60d2f5f027

  • SHA256

    acd329362b311a912e88b825259f552d41d15ec07a7c640fb14f3327a514b323

  • SHA512

    9ae2f59095e0afe5839d8356461cb4d385edfc02161b54c4cb39f2649afb24924265bd4a43c853f062243a9fe55e5b2947cb8b78bf7ca26321c91205fd35b86e

Malware Config

Targets

    • Target

      8129457fa7210937a1467a21f241b201

    • Size

      14.3MB

    • MD5

      8129457fa7210937a1467a21f241b201

    • SHA1

      f5013dad172969224076ca791692ac60d2f5f027

    • SHA256

      acd329362b311a912e88b825259f552d41d15ec07a7c640fb14f3327a514b323

    • SHA512

      9ae2f59095e0afe5839d8356461cb4d385edfc02161b54c4cb39f2649afb24924265bd4a43c853f062243a9fe55e5b2947cb8b78bf7ca26321c91205fd35b86e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks