General

  • Target

    abd5bc4c0ae51f1cbff6215bd4c7db1b

  • Size

    11.5MB

  • Sample

    240228-n75z4sba98

  • MD5

    abd5bc4c0ae51f1cbff6215bd4c7db1b

  • SHA1

    78f1c2d2696d42c971f7aac2a5a9e4054ff156c3

  • SHA256

    1034116ab8df2f195badd17f38b4628e3ba7251dcd2e62d7dd34bc2c2791eb82

  • SHA512

    7fbfbeb41c05b7c688b2ca4f9eda3bc6f5a6021f4024c67a647b88c3bbdfec258a3d81540ef951f938689b4aa10e75c697a4533014cd34ddf2426aa7a9949b40

  • SSDEEP

    196608:nrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrL:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      abd5bc4c0ae51f1cbff6215bd4c7db1b

    • Size

      11.5MB

    • MD5

      abd5bc4c0ae51f1cbff6215bd4c7db1b

    • SHA1

      78f1c2d2696d42c971f7aac2a5a9e4054ff156c3

    • SHA256

      1034116ab8df2f195badd17f38b4628e3ba7251dcd2e62d7dd34bc2c2791eb82

    • SHA512

      7fbfbeb41c05b7c688b2ca4f9eda3bc6f5a6021f4024c67a647b88c3bbdfec258a3d81540ef951f938689b4aa10e75c697a4533014cd34ddf2426aa7a9949b40

    • SSDEEP

      196608:nrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrL:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks