General

  • Target

    a934ab104f9f10c9bbcea5891d59ab05

  • Size

    12.7MB

  • Sample

    201214-k1h3apev62

  • MD5

    a934ab104f9f10c9bbcea5891d59ab05

  • SHA1

    3a8abf7057597105985d2b809ed1bb5e51cc98be

  • SHA256

    afa62a6fd9ec6720a1d9898f904ccb67e05bea02662a94f29e8c4857922ba72d

  • SHA512

    305096ac368b73e8a29754391cb628b23b3b1f949b48a9eba0bf98ad5632493e170fdab7fe70d3322a28eca51eb850c415dd122e6137255099b12eeab131eb65

Malware Config

Targets

    • Target

      a934ab104f9f10c9bbcea5891d59ab05

    • Size

      12.7MB

    • MD5

      a934ab104f9f10c9bbcea5891d59ab05

    • SHA1

      3a8abf7057597105985d2b809ed1bb5e51cc98be

    • SHA256

      afa62a6fd9ec6720a1d9898f904ccb67e05bea02662a94f29e8c4857922ba72d

    • SHA512

      305096ac368b73e8a29754391cb628b23b3b1f949b48a9eba0bf98ad5632493e170fdab7fe70d3322a28eca51eb850c415dd122e6137255099b12eeab131eb65

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks