General

  • Target

    52d2fb4d9a4b8d44b974f836d5416640237589f42e9ecd656cbc6cceea83b53a

  • Size

    104KB

  • Sample

    220717-b7vg6abhhl

  • MD5

    19ec7f687120d1bb75afe23c6f278e39

  • SHA1

    a29b19b2a66899b70ccf091ba7f6b9b83be5acc8

  • SHA256

    52d2fb4d9a4b8d44b974f836d5416640237589f42e9ecd656cbc6cceea83b53a

  • SHA512

    f69e19c58f86ce769228dd6526c430ec46f8d4a2f853406107e9c130e4408e53b42d6a62fbb647968afb92dc2f37b162e0bfd636f5160fcfadab3c1abc2feb76

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      52d2fb4d9a4b8d44b974f836d5416640237589f42e9ecd656cbc6cceea83b53a

    • Size

      104KB

    • MD5

      19ec7f687120d1bb75afe23c6f278e39

    • SHA1

      a29b19b2a66899b70ccf091ba7f6b9b83be5acc8

    • SHA256

      52d2fb4d9a4b8d44b974f836d5416640237589f42e9ecd656cbc6cceea83b53a

    • SHA512

      f69e19c58f86ce769228dd6526c430ec46f8d4a2f853406107e9c130e4408e53b42d6a62fbb647968afb92dc2f37b162e0bfd636f5160fcfadab3c1abc2feb76

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks