General

  • Target

    a0c32d1ccdb8238c793712a8bbc495cd

  • Size

    11.6MB

  • Sample

    240224-dekhlaga2s

  • MD5

    a0c32d1ccdb8238c793712a8bbc495cd

  • SHA1

    135db4d8014c605efc2a061522b40a419055ed25

  • SHA256

    03f372c9165a32ad7b3fdc7f0e13b6840df47b6e60983a64350778dd48a9ff71

  • SHA512

    1a3087731dc2d2664bea60cf9344cb8ea71b2cad99a5844a18cd3e3739d25485f51912792026929842d4ee59a9419b9b5c2afb182dea425a6d898a34325d6ffc

  • SSDEEP

    49152:kj5555555555555555555555555555555555555555555555555555555555555T:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      a0c32d1ccdb8238c793712a8bbc495cd

    • Size

      11.6MB

    • MD5

      a0c32d1ccdb8238c793712a8bbc495cd

    • SHA1

      135db4d8014c605efc2a061522b40a419055ed25

    • SHA256

      03f372c9165a32ad7b3fdc7f0e13b6840df47b6e60983a64350778dd48a9ff71

    • SHA512

      1a3087731dc2d2664bea60cf9344cb8ea71b2cad99a5844a18cd3e3739d25485f51912792026929842d4ee59a9419b9b5c2afb182dea425a6d898a34325d6ffc

    • SSDEEP

      49152:kj5555555555555555555555555555555555555555555555555555555555555T:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks