General

  • Target

    573ccc7f69afb0fa0d53b19b44a46de73a49dff0239a122d457f4e55a4961c09

  • Size

    108KB

  • Sample

    220725-ag12ksehdl

  • MD5

    75d4f22da8952b9c6e8c82f72bfedfea

  • SHA1

    95983ed45f7bd53399fb20e54a547308a2f9e9e4

  • SHA256

    573ccc7f69afb0fa0d53b19b44a46de73a49dff0239a122d457f4e55a4961c09

  • SHA512

    e6b945e7c5fc7259690435e780232bb6ffc3b4fd37f2cc9b6f0a7a4c6b9a175e8d84e7997454a0c11cfb44fb78863920191ed3633cee23baaa29f3ea0db0cec3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      573ccc7f69afb0fa0d53b19b44a46de73a49dff0239a122d457f4e55a4961c09

    • Size

      108KB

    • MD5

      75d4f22da8952b9c6e8c82f72bfedfea

    • SHA1

      95983ed45f7bd53399fb20e54a547308a2f9e9e4

    • SHA256

      573ccc7f69afb0fa0d53b19b44a46de73a49dff0239a122d457f4e55a4961c09

    • SHA512

      e6b945e7c5fc7259690435e780232bb6ffc3b4fd37f2cc9b6f0a7a4c6b9a175e8d84e7997454a0c11cfb44fb78863920191ed3633cee23baaa29f3ea0db0cec3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks