General

  • Target

    acb0fde336fa98fc541c69925c2f7c82

  • Size

    14.8MB

  • Sample

    201214-9xtrfg3fyj

  • MD5

    acb0fde336fa98fc541c69925c2f7c82

  • SHA1

    c2bfd9dca872e5b99326904e8aef4be9f8d7fe0e

  • SHA256

    e2d8cb1ebc11e8eed1d7e815fea002ab8adb88a3a68da5c2485231174458af8f

  • SHA512

    0d3b93b6e9d2b430989ee18807f878b84862c01667210eff4c9262e5c641df15987990f7a99d27ff248a293e27b7252ac0e4e6ce9588f1d271d98a014e5406df

Malware Config

Targets

    • Target

      acb0fde336fa98fc541c69925c2f7c82

    • Size

      14.8MB

    • MD5

      acb0fde336fa98fc541c69925c2f7c82

    • SHA1

      c2bfd9dca872e5b99326904e8aef4be9f8d7fe0e

    • SHA256

      e2d8cb1ebc11e8eed1d7e815fea002ab8adb88a3a68da5c2485231174458af8f

    • SHA512

      0d3b93b6e9d2b430989ee18807f878b84862c01667210eff4c9262e5c641df15987990f7a99d27ff248a293e27b7252ac0e4e6ce9588f1d271d98a014e5406df

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks