General
-
Target
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c
-
Size
10.2MB
-
Sample
231012-jkk9zaee9v
-
MD5
eea68bf2ded6d4a1f83621d9cc95996b
-
SHA1
1be80d3f418354fd5dbafe7fb257daafa66dc007
-
SHA256
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c
-
SHA512
3c23d9d4c46cab30a20aa5dacb98fe78526399a29c9c063de3e84b0fb3660f1edf659add5aa373e299cee7fb758c93c8cbd278ded8d998c8dcf9134d5166b8d3
-
SSDEEP
98304:b99999999999999999999999999999999999999999999999999999999999999H:
Static task
static1
Behavioral task
behavioral1
Sample
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c
-
Size
10.2MB
-
MD5
eea68bf2ded6d4a1f83621d9cc95996b
-
SHA1
1be80d3f418354fd5dbafe7fb257daafa66dc007
-
SHA256
594d6a2895b1881cd97b7cfb922c626010318fbee43feab7cb637d5ed869086c
-
SHA512
3c23d9d4c46cab30a20aa5dacb98fe78526399a29c9c063de3e84b0fb3660f1edf659add5aa373e299cee7fb758c93c8cbd278ded8d998c8dcf9134d5166b8d3
-
SSDEEP
98304:b99999999999999999999999999999999999999999999999999999999999999H:
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2