General

  • Target

    977f60bb46c98f4fece2c317fc17c504

  • Size

    14.2MB

  • Sample

    201214-kldby3ay6a

  • MD5

    977f60bb46c98f4fece2c317fc17c504

  • SHA1

    d246ad0209ed7041b0ee9004b36a4bad0513d876

  • SHA256

    2d09b4467fcf47fe6e2f95ea3af4b5dffe0522d87c1cbbe85bbe71ba81d7f628

  • SHA512

    4104422354bce5a50c08dda09529ddaef96fde520a84cf5f3c2ebfec794dfd1ba0c3ae0c7483ca6aef9c104f389db07793e05f0b1905a0fe7d03609c01677a39

Malware Config

Targets

    • Target

      977f60bb46c98f4fece2c317fc17c504

    • Size

      14.2MB

    • MD5

      977f60bb46c98f4fece2c317fc17c504

    • SHA1

      d246ad0209ed7041b0ee9004b36a4bad0513d876

    • SHA256

      2d09b4467fcf47fe6e2f95ea3af4b5dffe0522d87c1cbbe85bbe71ba81d7f628

    • SHA512

      4104422354bce5a50c08dda09529ddaef96fde520a84cf5f3c2ebfec794dfd1ba0c3ae0c7483ca6aef9c104f389db07793e05f0b1905a0fe7d03609c01677a39

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Privilege Escalation

New Service

1
T1050

Tasks