General

  • Target

    00f168270e8ebf2584f151d7cc7236da

  • Size

    11.7MB

  • Sample

    201214-xk2xh8waba

  • MD5

    00f168270e8ebf2584f151d7cc7236da

  • SHA1

    527dac58289ec820691048cb320d65c01c193e65

  • SHA256

    2603757f92034678ded0d4e72bbb78f2b29d6f7ee8f809b02d6056750fa579e4

  • SHA512

    184b6b12d02c673dcc6d6c4f478fba8f8a5fd036fc94118ecbd490ef2735d7dd8aeee8132932e3ea43d5a45a02823d3c473a713037a4fd9c871723db6e350837

Malware Config

Targets

    • Target

      00f168270e8ebf2584f151d7cc7236da

    • Size

      11.7MB

    • MD5

      00f168270e8ebf2584f151d7cc7236da

    • SHA1

      527dac58289ec820691048cb320d65c01c193e65

    • SHA256

      2603757f92034678ded0d4e72bbb78f2b29d6f7ee8f809b02d6056750fa579e4

    • SHA512

      184b6b12d02c673dcc6d6c4f478fba8f8a5fd036fc94118ecbd490ef2735d7dd8aeee8132932e3ea43d5a45a02823d3c473a713037a4fd9c871723db6e350837

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks