General

  • Target

    0424e7e8ad42081a1014a9916368ded2

  • Size

    13.7MB

  • Sample

    231229-z2jqgabfaq

  • MD5

    0424e7e8ad42081a1014a9916368ded2

  • SHA1

    a36e12fc67bf066b30e307af7d73116d314d3aed

  • SHA256

    91f0161cfa3bc557b46bccf010a7ee63327e58b4d68aada5f7a5747a02892f71

  • SHA512

    f368eba273b5256f85556431f6cd22cf114b5738fd7cb10682a9acd5dfe123f874dd19aa0c18a627d09d543fec967e5436f8929c7dc2f1527618b7e67d204735

  • SSDEEP

    49152:xmqCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      0424e7e8ad42081a1014a9916368ded2

    • Size

      13.7MB

    • MD5

      0424e7e8ad42081a1014a9916368ded2

    • SHA1

      a36e12fc67bf066b30e307af7d73116d314d3aed

    • SHA256

      91f0161cfa3bc557b46bccf010a7ee63327e58b4d68aada5f7a5747a02892f71

    • SHA512

      f368eba273b5256f85556431f6cd22cf114b5738fd7cb10682a9acd5dfe123f874dd19aa0c18a627d09d543fec967e5436f8929c7dc2f1527618b7e67d204735

    • SSDEEP

      49152:xmqCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks