General

  • Target

    27a14e1653fb0b415ab18bd220930344f8423b18e5c1e6587b142d595035aa4c

  • Size

    281KB

  • Sample

    220124-nxnyvaefak

  • MD5

    85bfad50ecc780909d8add6568fb4fef

  • SHA1

    5eaed9d25a9aeb34350bde97a8da7458ed2bcdc4

  • SHA256

    27a14e1653fb0b415ab18bd220930344f8423b18e5c1e6587b142d595035aa4c

  • SHA512

    f1186997d0af98e0cca86642f9d8cbf59f2e982a0b7f5e017f2cec654dd400abd85f21321fbc46c932bdb7f480f64745bf09b119b8459adec7ac5dfad9825b82

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      27a14e1653fb0b415ab18bd220930344f8423b18e5c1e6587b142d595035aa4c

    • Size

      281KB

    • MD5

      85bfad50ecc780909d8add6568fb4fef

    • SHA1

      5eaed9d25a9aeb34350bde97a8da7458ed2bcdc4

    • SHA256

      27a14e1653fb0b415ab18bd220930344f8423b18e5c1e6587b142d595035aa4c

    • SHA512

      f1186997d0af98e0cca86642f9d8cbf59f2e982a0b7f5e017f2cec654dd400abd85f21321fbc46c932bdb7f480f64745bf09b119b8459adec7ac5dfad9825b82

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks