General

  • Target

    4cd627b04650d91a492d524455aaa020

  • Size

    14.1MB

  • Sample

    240109-alxvqagedk

  • MD5

    4cd627b04650d91a492d524455aaa020

  • SHA1

    5e52edf351d46e60bf6350d469a494090c41689b

  • SHA256

    f4a987f3d011b577d1337927b964992a565cc0960a4324114852faba0768d0db

  • SHA512

    d51a2a331289b71da394d4699d1985690d1f0adfd9b3bda504d008cdb01d64d9a286c654a3d939c7306f3380419f8982cfb9c4a779101b789a2a0fab60052ec7

  • SSDEEP

    49152:yvVGWdbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbH:yvV

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      4cd627b04650d91a492d524455aaa020

    • Size

      14.1MB

    • MD5

      4cd627b04650d91a492d524455aaa020

    • SHA1

      5e52edf351d46e60bf6350d469a494090c41689b

    • SHA256

      f4a987f3d011b577d1337927b964992a565cc0960a4324114852faba0768d0db

    • SHA512

      d51a2a331289b71da394d4699d1985690d1f0adfd9b3bda504d008cdb01d64d9a286c654a3d939c7306f3380419f8982cfb9c4a779101b789a2a0fab60052ec7

    • SSDEEP

      49152:yvVGWdbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbH:yvV

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks