General

  • Target

    281caa07aa1da7dbfecf48057da8f8d81fa98661de792de568d5d26765d57913

  • Size

    13.1MB

  • Sample

    231114-xqe7ssfd5w

  • MD5

    873c0a981c80da05593897c6aec0e842

  • SHA1

    3fb083e944c36cc3a938e64d9c10ace3065d444a

  • SHA256

    281caa07aa1da7dbfecf48057da8f8d81fa98661de792de568d5d26765d57913

  • SHA512

    27c119c25dbe7cca2da3043eff931bfc0d9ad5b34cd7489000181cf3d8aa6814b83ef1185f6e7f692e9e87cca17d9b5c5d89ab0402e9264840fa80f5da21800d

  • SSDEEP

    393216:tkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk7:tkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk7

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      281caa07aa1da7dbfecf48057da8f8d81fa98661de792de568d5d26765d57913

    • Size

      13.1MB

    • MD5

      873c0a981c80da05593897c6aec0e842

    • SHA1

      3fb083e944c36cc3a938e64d9c10ace3065d444a

    • SHA256

      281caa07aa1da7dbfecf48057da8f8d81fa98661de792de568d5d26765d57913

    • SHA512

      27c119c25dbe7cca2da3043eff931bfc0d9ad5b34cd7489000181cf3d8aa6814b83ef1185f6e7f692e9e87cca17d9b5c5d89ab0402e9264840fa80f5da21800d

    • SSDEEP

      393216:tkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk7:tkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks