General

  • Target

    b4d9f0cb213707065776e51bc23f2bad

  • Size

    12.6MB

  • Sample

    201214-kghakaws22

  • MD5

    b4d9f0cb213707065776e51bc23f2bad

  • SHA1

    f20253f8be90711a0986bdee33a9c061e38c8790

  • SHA256

    970547ed157ac695b887a3e8d0d657080d5703e8f9b0eced3295d6fa7a950e0d

  • SHA512

    06838656b9f9ecb18c0b5451e69b1d69a26dc1feb0bc8e0d1d84495829618e72b71d8ffdb03d184d3cbfd4521999b0c6f4cee6afacce72b470516874faceda61

Malware Config

Targets

    • Target

      b4d9f0cb213707065776e51bc23f2bad

    • Size

      12.6MB

    • MD5

      b4d9f0cb213707065776e51bc23f2bad

    • SHA1

      f20253f8be90711a0986bdee33a9c061e38c8790

    • SHA256

      970547ed157ac695b887a3e8d0d657080d5703e8f9b0eced3295d6fa7a950e0d

    • SHA512

      06838656b9f9ecb18c0b5451e69b1d69a26dc1feb0bc8e0d1d84495829618e72b71d8ffdb03d184d3cbfd4521999b0c6f4cee6afacce72b470516874faceda61

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks