General

  • Target

    2897e555be336cb52bf83da45ca4cf28ec455f06ad960bb41b1b08bfcc80d74b

  • Size

    143KB

  • Sample

    220615-vl6svagfgl

  • MD5

    dd7f8116f16c8e53b2c25def6db171c9

  • SHA1

    7490dc96c28d8ef777bfa834576a0121c14525cb

  • SHA256

    2897e555be336cb52bf83da45ca4cf28ec455f06ad960bb41b1b08bfcc80d74b

  • SHA512

    6b45456f69753baf62834984ccc9ac2a48c7878e22ef805c93263463d6e73caffcde34aa338a655925d490a4c62395124e2a208ff288e7fd9ec2b28e2511a88f

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2897e555be336cb52bf83da45ca4cf28ec455f06ad960bb41b1b08bfcc80d74b

    • Size

      143KB

    • MD5

      dd7f8116f16c8e53b2c25def6db171c9

    • SHA1

      7490dc96c28d8ef777bfa834576a0121c14525cb

    • SHA256

      2897e555be336cb52bf83da45ca4cf28ec455f06ad960bb41b1b08bfcc80d74b

    • SHA512

      6b45456f69753baf62834984ccc9ac2a48c7878e22ef805c93263463d6e73caffcde34aa338a655925d490a4c62395124e2a208ff288e7fd9ec2b28e2511a88f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks