Resubmissions

23-01-2023 11:03

230123-m5z6eaef4s 10

09-05-2020 13:43

200509-9mgqkb9xn6 10

General

  • Target

    supvobl.exe

  • Size

    12.5MB

  • Sample

    230123-m5z6eaef4s

  • MD5

    be286c784044379ca9a6ca6e7211a29f

  • SHA1

    bf8010a0e4b7ae88095bd9ee303707f4c0da549e

  • SHA256

    d05cd710559cb6a23a84f44bfe88b91582862c7d70134cf71807ae0c49964993

  • SHA512

    862e1beffa2cd58cd606a9edf2be79a03ca4a93f2edd6528e91eed2f68ad889e2e76dd43f164cd8f7eb02567504cbcf9581f730177f841a3e5a0298b48674b13

  • SSDEEP

    24576:P7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hg:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      supvobl.exe

    • Size

      12.5MB

    • MD5

      be286c784044379ca9a6ca6e7211a29f

    • SHA1

      bf8010a0e4b7ae88095bd9ee303707f4c0da549e

    • SHA256

      d05cd710559cb6a23a84f44bfe88b91582862c7d70134cf71807ae0c49964993

    • SHA512

      862e1beffa2cd58cd606a9edf2be79a03ca4a93f2edd6528e91eed2f68ad889e2e76dd43f164cd8f7eb02567504cbcf9581f730177f841a3e5a0298b48674b13

    • SSDEEP

      24576:P7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hg:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks