General

  • Target

    3ca6d488bd6aff540495e9624fdb502d

  • Size

    11.1MB

  • Sample

    201214-myvrh7asxs

  • MD5

    3ca6d488bd6aff540495e9624fdb502d

  • SHA1

    c050425bb11844672672ec0a87808b731afefd2a

  • SHA256

    1095e251f8219d5aa618e9dc41ac314fb1cb1989580bdd60dac00cd6a903d053

  • SHA512

    73a4fc3beab31fe61f46fd67af4d5077ed8707c7ed80fc29981512d417b524ec46a2f49ada955efea011533d9b4cbefa8d17365132bef5ed6ca75bd69a8271f6

Malware Config

Targets

    • Target

      3ca6d488bd6aff540495e9624fdb502d

    • Size

      11.1MB

    • MD5

      3ca6d488bd6aff540495e9624fdb502d

    • SHA1

      c050425bb11844672672ec0a87808b731afefd2a

    • SHA256

      1095e251f8219d5aa618e9dc41ac314fb1cb1989580bdd60dac00cd6a903d053

    • SHA512

      73a4fc3beab31fe61f46fd67af4d5077ed8707c7ed80fc29981512d417b524ec46a2f49ada955efea011533d9b4cbefa8d17365132bef5ed6ca75bd69a8271f6

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks