General
-
Target
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357
-
Size
11.9MB
-
Sample
231114-xn7t2adh93
-
MD5
b5072febf349daf9ec3efb305e919bbb
-
SHA1
f897d5d432849eba226148bd301b19e6ded7c67a
-
SHA256
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357
-
SHA512
bc46f4c9b859a47a60de9d99df7a8084c96373238e505122a222f0f9fbb89514adf29d247b622714c82be726866a9463dcbb2bb9d8fd88a63cd02ac2f1b2839c
-
SSDEEP
3072:P8NYa2qJjULtTNupQyEC6pxhhfm5OcVi:PsRItTNKr2f45
Static task
static1
Behavioral task
behavioral1
Sample
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357
-
Size
11.9MB
-
MD5
b5072febf349daf9ec3efb305e919bbb
-
SHA1
f897d5d432849eba226148bd301b19e6ded7c67a
-
SHA256
978dbbcd7fe5aef66e208b49220efe402292abb56754dd81ba61c10ec9bcc357
-
SHA512
bc46f4c9b859a47a60de9d99df7a8084c96373238e505122a222f0f9fbb89514adf29d247b622714c82be726866a9463dcbb2bb9d8fd88a63cd02ac2f1b2839c
-
SSDEEP
3072:P8NYa2qJjULtTNupQyEC6pxhhfm5OcVi:PsRItTNKr2f45
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2