General

  • Target

    0c1a283b875898c9ce315ca6af4f281b

  • Size

    13.4MB

  • Sample

    231224-w6xaksgfdq

  • MD5

    0c1a283b875898c9ce315ca6af4f281b

  • SHA1

    77c4cafeed6fa62df677072593f3c3ec8ee95ae3

  • SHA256

    a5186d8788910d7091812b8a7db89167ffc09d670d73d5dd9a08287f8cfabb1b

  • SHA512

    04f4386034dfe5379af03fd474777c1789b96020804bb191d84a42beab1a37b61380f5ac1566f23283955fd58ac21dd76cf5ac05482a5294f58198c93221234b

  • SSDEEP

    49152:anHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:a

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      0c1a283b875898c9ce315ca6af4f281b

    • Size

      13.4MB

    • MD5

      0c1a283b875898c9ce315ca6af4f281b

    • SHA1

      77c4cafeed6fa62df677072593f3c3ec8ee95ae3

    • SHA256

      a5186d8788910d7091812b8a7db89167ffc09d670d73d5dd9a08287f8cfabb1b

    • SHA512

      04f4386034dfe5379af03fd474777c1789b96020804bb191d84a42beab1a37b61380f5ac1566f23283955fd58ac21dd76cf5ac05482a5294f58198c93221234b

    • SSDEEP

      49152:anHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks