General

  • Target

    4737b9c167d5f4f7a88173edb826c210db23cf5209e36c792294ec16ef8463fc

  • Size

    177KB

  • Sample

    220714-h8exescbhp

  • MD5

    8fb14c353edbf22083fb850c404960e1

  • SHA1

    26a73188db4e760cded73de71bb0434f0326ed2e

  • SHA256

    4737b9c167d5f4f7a88173edb826c210db23cf5209e36c792294ec16ef8463fc

  • SHA512

    b5a23b86a4abf91aa5b016dcc851d1b9ba2565c48a9088bbd9c2cb1e7c633b72b778a0eebaf61415d04e74abca3e0980d6915a63c1288a439d80de7a369b358a

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      4737b9c167d5f4f7a88173edb826c210db23cf5209e36c792294ec16ef8463fc

    • Size

      177KB

    • MD5

      8fb14c353edbf22083fb850c404960e1

    • SHA1

      26a73188db4e760cded73de71bb0434f0326ed2e

    • SHA256

      4737b9c167d5f4f7a88173edb826c210db23cf5209e36c792294ec16ef8463fc

    • SHA512

      b5a23b86a4abf91aa5b016dcc851d1b9ba2565c48a9088bbd9c2cb1e7c633b72b778a0eebaf61415d04e74abca3e0980d6915a63c1288a439d80de7a369b358a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks