General

  • Target

    190fbee46a1824feee06569aa79f651f

  • Size

    12.2MB

  • Sample

    231224-3b1svabghq

  • MD5

    190fbee46a1824feee06569aa79f651f

  • SHA1

    53ad94314c6b0cd4cddce50a73c629cdc8fbf4a0

  • SHA256

    94822641c01bf60fce29c05b2eaa530b73346acbf888869cc7205451139ded16

  • SHA512

    002637e504dcff6a25f5689f001edf08c43566ba8cf34387d072e9245c4f00704721e6c8b53c2e741d76789f68927af3e30a35dcf30bff05ea1dc1ea7439f6f1

  • SSDEEP

    49152:sHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      190fbee46a1824feee06569aa79f651f

    • Size

      12.2MB

    • MD5

      190fbee46a1824feee06569aa79f651f

    • SHA1

      53ad94314c6b0cd4cddce50a73c629cdc8fbf4a0

    • SHA256

      94822641c01bf60fce29c05b2eaa530b73346acbf888869cc7205451139ded16

    • SHA512

      002637e504dcff6a25f5689f001edf08c43566ba8cf34387d072e9245c4f00704721e6c8b53c2e741d76789f68927af3e30a35dcf30bff05ea1dc1ea7439f6f1

    • SSDEEP

      49152:sHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks