General

  • Target

    7e434a6cbcc3d938039a2db91259dfcb.exe

  • Size

    11.9MB

  • Sample

    240102-tpazxahgfr

  • MD5

    7e434a6cbcc3d938039a2db91259dfcb

  • SHA1

    c7654ecaa2e52a2fec9083b62d4871ba58c67929

  • SHA256

    22271e2c71304fbe07ac384b7900a449ac4e16252e63d916096399ba972ed16a

  • SHA512

    d7bb6e2180e73ba01928dd6c087e0ab8cf64a5225f53a948521b64b205c57c00a3219a6b8ee321ac7a55bf83dafa19af22da04260025d51b9376da7f616c14a2

  • SSDEEP

    49152:cBpQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      7e434a6cbcc3d938039a2db91259dfcb.exe

    • Size

      11.9MB

    • MD5

      7e434a6cbcc3d938039a2db91259dfcb

    • SHA1

      c7654ecaa2e52a2fec9083b62d4871ba58c67929

    • SHA256

      22271e2c71304fbe07ac384b7900a449ac4e16252e63d916096399ba972ed16a

    • SHA512

      d7bb6e2180e73ba01928dd6c087e0ab8cf64a5225f53a948521b64b205c57c00a3219a6b8ee321ac7a55bf83dafa19af22da04260025d51b9376da7f616c14a2

    • SSDEEP

      49152:cBpQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks