General

  • Target

    733547b3964e5000616fa0fa71f31e8e

  • Size

    12.6MB

  • Sample

    201214-ln5te4ywb2

  • MD5

    733547b3964e5000616fa0fa71f31e8e

  • SHA1

    3e4691a61f811d8cc8c10b7a6e64c41d1f645c86

  • SHA256

    60bcd69140ed6a79b7baa6a0005bfbef07a13f6918db29f4e6b1e6f5290d6db3

  • SHA512

    0df59d78a4222f4e0e693668a33e4c28af17991ee119f58892524be5494f29830f81361b7ca4f1570909530d80089a8c08a6eb73e7455c0ccd32d2e700fcda7f

Malware Config

Targets

    • Target

      733547b3964e5000616fa0fa71f31e8e

    • Size

      12.6MB

    • MD5

      733547b3964e5000616fa0fa71f31e8e

    • SHA1

      3e4691a61f811d8cc8c10b7a6e64c41d1f645c86

    • SHA256

      60bcd69140ed6a79b7baa6a0005bfbef07a13f6918db29f4e6b1e6f5290d6db3

    • SHA512

      0df59d78a4222f4e0e693668a33e4c28af17991ee119f58892524be5494f29830f81361b7ca4f1570909530d80089a8c08a6eb73e7455c0ccd32d2e700fcda7f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks