General

  • Target

    07c1216f0059bf50de173ee5a373b5e5

  • Size

    10.5MB

  • Sample

    231229-3z1gzsccgj

  • MD5

    07c1216f0059bf50de173ee5a373b5e5

  • SHA1

    cbbe88d0baeb5ee7531b070ac9f8379644879f6b

  • SHA256

    f7f52a420f5a91365172d5aa150fa8ddb332683a2ceaa77048383aa90ad89edb

  • SHA512

    bc69b4efbbd539527162338afc997b2a50cc1bdb8e75aa24a403f8a616ecffd0c144e030178857ad242f9284a1d53c76803f6c3739805204131366aaec4392bd

  • SSDEEP

    98304:bjhd88888888888888888888888888888888888888888888888888888888888H:b

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

lazystax.ru

Targets

    • Target

      07c1216f0059bf50de173ee5a373b5e5

    • Size

      10.5MB

    • MD5

      07c1216f0059bf50de173ee5a373b5e5

    • SHA1

      cbbe88d0baeb5ee7531b070ac9f8379644879f6b

    • SHA256

      f7f52a420f5a91365172d5aa150fa8ddb332683a2ceaa77048383aa90ad89edb

    • SHA512

      bc69b4efbbd539527162338afc997b2a50cc1bdb8e75aa24a403f8a616ecffd0c144e030178857ad242f9284a1d53c76803f6c3739805204131366aaec4392bd

    • SSDEEP

      98304:bjhd88888888888888888888888888888888888888888888888888888888888H:b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks