General

  • Target

    39e2b92059aea92f0cef66384347db789668df9ba87067a21060b6fdf7da7bc9

  • Size

    312KB

  • Sample

    220625-jg1v9abeem

  • MD5

    469c2f23c85976e2d7a79c013b87121b

  • SHA1

    a98f1b95299a2546aca7e959b9af97eed341a01b

  • SHA256

    39e2b92059aea92f0cef66384347db789668df9ba87067a21060b6fdf7da7bc9

  • SHA512

    1ef5fdeb5f0fd3872d351c93c661fdebc504cec452ff9e00ab3abc7a84aea0be9ba3d2de52e7c3c900b67b55d95c2422d0cdc2ed16ada940a4f662ac884559c9

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      39e2b92059aea92f0cef66384347db789668df9ba87067a21060b6fdf7da7bc9

    • Size

      312KB

    • MD5

      469c2f23c85976e2d7a79c013b87121b

    • SHA1

      a98f1b95299a2546aca7e959b9af97eed341a01b

    • SHA256

      39e2b92059aea92f0cef66384347db789668df9ba87067a21060b6fdf7da7bc9

    • SHA512

      1ef5fdeb5f0fd3872d351c93c661fdebc504cec452ff9e00ab3abc7a84aea0be9ba3d2de52e7c3c900b67b55d95c2422d0cdc2ed16ada940a4f662ac884559c9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks