General

  • Target

    135f4c6694be14dc984b1b7889691cce

  • Size

    12.4MB

  • Sample

    231225-kwef8secdp

  • MD5

    135f4c6694be14dc984b1b7889691cce

  • SHA1

    71c1540738c195942e7959be4f12902a9804a02f

  • SHA256

    0763ff28508f44308fef952146703eda067ba061b621a9f60f7d1b99ac0a4227

  • SHA512

    68cca94ac4922c7c9366150ba2666d83a5bc440dab16ecda3c5a4a440ce7ab1d017643ba224602df63347dcbb2cea2ab907855cf88d00708f52f11022fcad6fb

  • SSDEEP

    49152:iRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBX:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      135f4c6694be14dc984b1b7889691cce

    • Size

      12.4MB

    • MD5

      135f4c6694be14dc984b1b7889691cce

    • SHA1

      71c1540738c195942e7959be4f12902a9804a02f

    • SHA256

      0763ff28508f44308fef952146703eda067ba061b621a9f60f7d1b99ac0a4227

    • SHA512

      68cca94ac4922c7c9366150ba2666d83a5bc440dab16ecda3c5a4a440ce7ab1d017643ba224602df63347dcbb2cea2ab907855cf88d00708f52f11022fcad6fb

    • SSDEEP

      49152:iRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks