General

  • Target

    f14a46d2d5535867d84aa11fa8ae5c2c

  • Size

    10.2MB

  • Sample

    201214-zf57vkvyjn

  • MD5

    f14a46d2d5535867d84aa11fa8ae5c2c

  • SHA1

    39d19968f1106dae2917f838e15643ed2fba35ef

  • SHA256

    b36c42fd589f6eeacc8f5b4fb21b37c4eef8bd1a8a8a737d8e7e8d09f9f6e1dd

  • SHA512

    0b7c5a97747333358cd41631c178f4810b54287e6516950f82e933e9909c3d66809d291985ed4d53b68920d9fba84bd9f7721b1ba80f96ce88668debf608df2b

Malware Config

Targets

    • Target

      f14a46d2d5535867d84aa11fa8ae5c2c

    • Size

      10.2MB

    • MD5

      f14a46d2d5535867d84aa11fa8ae5c2c

    • SHA1

      39d19968f1106dae2917f838e15643ed2fba35ef

    • SHA256

      b36c42fd589f6eeacc8f5b4fb21b37c4eef8bd1a8a8a737d8e7e8d09f9f6e1dd

    • SHA512

      0b7c5a97747333358cd41631c178f4810b54287e6516950f82e933e9909c3d66809d291985ed4d53b68920d9fba84bd9f7721b1ba80f96ce88668debf608df2b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks