General
-
Target
05a2ffa77432d48e8dffb43a9e201c28
-
Size
10.0MB
-
Sample
231229-2er5fahaa6
-
MD5
05a2ffa77432d48e8dffb43a9e201c28
-
SHA1
63cf6faadb2815d4eaaa6fa82f8e561d92dfa487
-
SHA256
9c04dffcd40004b5474f4827f6eac7537f8a049eee351a6866206943c55e7513
-
SHA512
c15e73e89f936f0d28b0ed32a0a09cab11f6957d566da281cd903f80db94200e713ea09373bb1204d20396e1679a1ea6adf7a238d9ad925806ee01f0a70706d4
-
SSDEEP
49152:UQsPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:UQ
Static task
static1
Behavioral task
behavioral1
Sample
05a2ffa77432d48e8dffb43a9e201c28.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05a2ffa77432d48e8dffb43a9e201c28.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
05a2ffa77432d48e8dffb43a9e201c28
-
Size
10.0MB
-
MD5
05a2ffa77432d48e8dffb43a9e201c28
-
SHA1
63cf6faadb2815d4eaaa6fa82f8e561d92dfa487
-
SHA256
9c04dffcd40004b5474f4827f6eac7537f8a049eee351a6866206943c55e7513
-
SHA512
c15e73e89f936f0d28b0ed32a0a09cab11f6957d566da281cd903f80db94200e713ea09373bb1204d20396e1679a1ea6adf7a238d9ad925806ee01f0a70706d4
-
SSDEEP
49152:UQsPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:UQ
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2