General

  • Target

    6eccbd78ffa89d1087dd16a714e0a512

  • Size

    12.4MB

  • Sample

    201214-td4yww38d2

  • MD5

    6eccbd78ffa89d1087dd16a714e0a512

  • SHA1

    4c7c4d10f9089e3ada8cc8e25b9fbbc85f39dad0

  • SHA256

    8f3bc132f79d46b744f512f8cf3b831aa37268daed73dc03d9e52c1b6c6022ac

  • SHA512

    a35b95bd41ac021eea2b59de6ebbab96cb168df9c0bbdeb4e95e97dbfb6bb7c07a9f9b18a95f2e1e22086344ada44303b347bb1d4272d07fbc209494c03cd24e

Malware Config

Targets

    • Target

      6eccbd78ffa89d1087dd16a714e0a512

    • Size

      12.4MB

    • MD5

      6eccbd78ffa89d1087dd16a714e0a512

    • SHA1

      4c7c4d10f9089e3ada8cc8e25b9fbbc85f39dad0

    • SHA256

      8f3bc132f79d46b744f512f8cf3b831aa37268daed73dc03d9e52c1b6c6022ac

    • SHA512

      a35b95bd41ac021eea2b59de6ebbab96cb168df9c0bbdeb4e95e97dbfb6bb7c07a9f9b18a95f2e1e22086344ada44303b347bb1d4272d07fbc209494c03cd24e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks