General

  • Target

    a2c62ebf3427fe20b4127c0011f72e65

  • Size

    14.4MB

  • Sample

    201214-5nlbzxdwc2

  • MD5

    a2c62ebf3427fe20b4127c0011f72e65

  • SHA1

    728d80b8d56aafb658db5cf58f238273425e3db7

  • SHA256

    c5ce5ca28f84c3572be365057c649b167e9ae0408842ae6f8e5756f1b29a26f1

  • SHA512

    b1357783e5ee6e74811dc1ee871ff2cd7881811afd1119518449e0ac8e236d92c90c305f25c8770b0e442cee125d94f8ad9189319a7d8a1ac1cf7339f22f6f93

Malware Config

Targets

    • Target

      a2c62ebf3427fe20b4127c0011f72e65

    • Size

      14.4MB

    • MD5

      a2c62ebf3427fe20b4127c0011f72e65

    • SHA1

      728d80b8d56aafb658db5cf58f238273425e3db7

    • SHA256

      c5ce5ca28f84c3572be365057c649b167e9ae0408842ae6f8e5756f1b29a26f1

    • SHA512

      b1357783e5ee6e74811dc1ee871ff2cd7881811afd1119518449e0ac8e236d92c90c305f25c8770b0e442cee125d94f8ad9189319a7d8a1ac1cf7339f22f6f93

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks