General

  • Target

    adf0aa260fb8907a875b917311d03d43

  • Size

    11.1MB

  • Sample

    201214-fp3d5bqdhs

  • MD5

    adf0aa260fb8907a875b917311d03d43

  • SHA1

    a60c140529e592bac90323e9a59d667627298681

  • SHA256

    901a6e2c22ea76188dde3daca9e06098efe263395d8fe3e7040b13a0b426da7c

  • SHA512

    02f6e7418eec00809df60ed650cb20674cb263cbe9d37edb0dfc94db93077f30ab98baf4415ba5c69c5a8bb86080055faa42d1bd91787cffd859d18281929c29

Malware Config

Targets

    • Target

      adf0aa260fb8907a875b917311d03d43

    • Size

      11.1MB

    • MD5

      adf0aa260fb8907a875b917311d03d43

    • SHA1

      a60c140529e592bac90323e9a59d667627298681

    • SHA256

      901a6e2c22ea76188dde3daca9e06098efe263395d8fe3e7040b13a0b426da7c

    • SHA512

      02f6e7418eec00809df60ed650cb20674cb263cbe9d37edb0dfc94db93077f30ab98baf4415ba5c69c5a8bb86080055faa42d1bd91787cffd859d18281929c29

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks