General
-
Target
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985
-
Size
11.6MB
-
Sample
231114-xwqkqaeg56
-
MD5
f537901667e970bb0f90a23d9f41ca47
-
SHA1
c6ff27c4a677c05b8b499378f766fee2dfc00b0a
-
SHA256
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985
-
SHA512
c2008c469dca56c4f6a8129537a381d28aadf189238a78fea99117bb6bf10188a55f3de5c0614303d78227fe1b1af38f2ace7b630a5031935b99e7d11b45f1c3
-
SSDEEP
1536:08TmBIho1tWbUTN108XOxeP8Vzim18+MHpShmKFWTWCg1IEOxBIhZZCt:76Oi0UpDexBNNcowKMTWB1InxOZZCt
Static task
static1
Behavioral task
behavioral1
Sample
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985
-
Size
11.6MB
-
MD5
f537901667e970bb0f90a23d9f41ca47
-
SHA1
c6ff27c4a677c05b8b499378f766fee2dfc00b0a
-
SHA256
13b33a486005cadd434187ba6dfaabc4ffbfa296fa26eb7883db5ed646fdc985
-
SHA512
c2008c469dca56c4f6a8129537a381d28aadf189238a78fea99117bb6bf10188a55f3de5c0614303d78227fe1b1af38f2ace7b630a5031935b99e7d11b45f1c3
-
SSDEEP
1536:08TmBIho1tWbUTN108XOxeP8Vzim18+MHpShmKFWTWCg1IEOxBIhZZCt:76Oi0UpDexBNNcowKMTWB1InxOZZCt
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2