General

  • Target

    e1eab3b0646918e3a8ed12fd0eac60d9

  • Size

    11.3MB

  • Sample

    201214-g1qg49zqkx

  • MD5

    e1eab3b0646918e3a8ed12fd0eac60d9

  • SHA1

    2ac956c2328844a0ec637ec0d847a260a9ecb4bc

  • SHA256

    cb3485d42a7e3dba0829372489b8869c9abe0b157911167006e6c823a22b1986

  • SHA512

    73d1a86a918424c2f3f8e71e2734c4855824124e80ff2f12897c7d94b3621f13dcd1bb7084b9e8812b5664f33efea7570b878001aaabb491b7b8caf4653f9579

Malware Config

Targets

    • Target

      e1eab3b0646918e3a8ed12fd0eac60d9

    • Size

      11.3MB

    • MD5

      e1eab3b0646918e3a8ed12fd0eac60d9

    • SHA1

      2ac956c2328844a0ec637ec0d847a260a9ecb4bc

    • SHA256

      cb3485d42a7e3dba0829372489b8869c9abe0b157911167006e6c823a22b1986

    • SHA512

      73d1a86a918424c2f3f8e71e2734c4855824124e80ff2f12897c7d94b3621f13dcd1bb7084b9e8812b5664f33efea7570b878001aaabb491b7b8caf4653f9579

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks