General

  • Target

    101512df3ce4c79c8f763e779e8d0cf1bfe31089b7107eb384280c3f6adc40b7

  • Size

    137KB

  • Sample

    220604-qtwwdsdegm

  • MD5

    d621a78cf6343c38fa7356b7a2846ddd

  • SHA1

    8037750152302eeffddab9e0efe93967bbafd582

  • SHA256

    101512df3ce4c79c8f763e779e8d0cf1bfe31089b7107eb384280c3f6adc40b7

  • SHA512

    6c3144dc20bc6048456bb6330b93df1566d969971334259e393c15e38c1f282e24f982ea28400b53283a6b538d4a7fcbe6283cad0fe24b8f45cd26bdc4c70ef4

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      101512df3ce4c79c8f763e779e8d0cf1bfe31089b7107eb384280c3f6adc40b7

    • Size

      137KB

    • MD5

      d621a78cf6343c38fa7356b7a2846ddd

    • SHA1

      8037750152302eeffddab9e0efe93967bbafd582

    • SHA256

      101512df3ce4c79c8f763e779e8d0cf1bfe31089b7107eb384280c3f6adc40b7

    • SHA512

      6c3144dc20bc6048456bb6330b93df1566d969971334259e393c15e38c1f282e24f982ea28400b53283a6b538d4a7fcbe6283cad0fe24b8f45cd26bdc4c70ef4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks