MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 693e7898b554e11d83b95c844318c1a3efef345aefa1cd01a3f4d5bcfcbbef12. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 693e7898b554e11d83b95c844318c1a3efef345aefa1cd01a3f4d5bcfcbbef12
SHA3-384 hash: 6567f8931aef13e507a5601c5435041947d71ea962a878264325b777ceb2952fa76e6fb6a371e59710dd7cdf5aad144d
SHA1 hash: e72a18db38c9335cb365219470719572129a98ce
MD5 hash: e885703b292b35c036c4a9f09335be48
humanhash: oxygen-tennessee-vermont-mars
File name:85cbd15de07204ffb5455f496a1ccd05
Download: download sample
Signature Tofsee
File size:10'860'032 bytes
First seen:2020-11-17 11:29:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 300ecc0abea8945fcd3b21c86c177b56 (8 x Tofsee)
ssdeep 196608:b66666666666666666666666666666666666666666666666666666666666666W:
Threatray 108 similar samples on MalwareBazaar
TLSH DFB6D1318F048CA8FD16E639AF30F6635B91F4929EFA970729E5A1B34DD62E09DC01C5
Reporter seifreed
Tags:Tofsee

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'049
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Moving a file to the Windows subdirectory
Launching a process
Creating a service
Launching a service
Creating a process from a recently created file
Launching the process to change the firewall settings
DNS request
Connection attempt
Enabling autorun for a service
Unauthorized injection to a system process
Deleting of the original file
Adding exclusions to Windows Defender
Threat name:
Win32.Backdoor.Tofsee
Status:
Malicious
First seen:
2020-11-17 11:30:35 UTC
AV detection:
41 of 48 (85.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence trojan
Behaviour
Suspicious use of WriteProcessMemory
Launches sc.exe
Modifies service
Suspicious use of SetThreadContext
Deletes itself
Creates new service(s)
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Windows security bypass
Unpacked files
SH256 hash:
693e7898b554e11d83b95c844318c1a3efef345aefa1cd01a3f4d5bcfcbbef12
MD5 hash:
e885703b292b35c036c4a9f09335be48
SHA1 hash:
e72a18db38c9335cb365219470719572129a98ce
SH256 hash:
bf93dcd126052d12f82971c1aca0b5ea28278679f89be4a5668f1d21bf22cd26
MD5 hash:
88f25261bdf7b42cad50e5231a2b141b
SHA1 hash:
9affc99c90f0f30a285c1480bb56b84b04da247d
Detections:
win_tofsee_w0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_tofsee_w0
Author:akrasuski1

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments