General

  • Target

    f9d886d091d96c96cc24949f988ff3a7

  • Size

    12.3MB

  • Sample

    201214-tsg1rxrkbj

  • MD5

    f9d886d091d96c96cc24949f988ff3a7

  • SHA1

    37ee93ecf629f009e8d8e1eefc5c7511d1e87c33

  • SHA256

    71f4ed14754453be26ce5dd9cf9fe487ca3a242d22647fe53906aa50f344346f

  • SHA512

    99ef2552c4ddd4db73f1562a838fc1edcb51059b9e5a2ff6feca54a59daff1b293403a9fbb512422d31f16538c74ae0d1fe9e511e0b19897b9c4c8087cb1dca2

Malware Config

Targets

    • Target

      f9d886d091d96c96cc24949f988ff3a7

    • Size

      12.3MB

    • MD5

      f9d886d091d96c96cc24949f988ff3a7

    • SHA1

      37ee93ecf629f009e8d8e1eefc5c7511d1e87c33

    • SHA256

      71f4ed14754453be26ce5dd9cf9fe487ca3a242d22647fe53906aa50f344346f

    • SHA512

      99ef2552c4ddd4db73f1562a838fc1edcb51059b9e5a2ff6feca54a59daff1b293403a9fbb512422d31f16538c74ae0d1fe9e511e0b19897b9c4c8087cb1dca2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks