General

  • Target

    b6202f30b837ad0025da86ecf9f5f1c9

  • Size

    12.6MB

  • Sample

    240306-bf1vvsfg97

  • MD5

    b6202f30b837ad0025da86ecf9f5f1c9

  • SHA1

    ac922759c8dde66341dd92f557c828b894aa0cfb

  • SHA256

    b6768d16dbabafc1d9d07cdd065c875522cce0b6ee493187ba984e3e87b0aece

  • SHA512

    ddf185d38b0ad7b7c8a69c27830c388ef3d20a3430cea4aecdeeae857b5d9209be4fda62d06b91b2018cd1d9f52f521fc95c5f9989ba4c54bd6f21bc4ebac527

  • SSDEEP

    12288:ZRXQK44fy6111111111111111111111111111111111111111111111111111111:ZRx2

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      b6202f30b837ad0025da86ecf9f5f1c9

    • Size

      12.6MB

    • MD5

      b6202f30b837ad0025da86ecf9f5f1c9

    • SHA1

      ac922759c8dde66341dd92f557c828b894aa0cfb

    • SHA256

      b6768d16dbabafc1d9d07cdd065c875522cce0b6ee493187ba984e3e87b0aece

    • SHA512

      ddf185d38b0ad7b7c8a69c27830c388ef3d20a3430cea4aecdeeae857b5d9209be4fda62d06b91b2018cd1d9f52f521fc95c5f9989ba4c54bd6f21bc4ebac527

    • SSDEEP

      12288:ZRXQK44fy6111111111111111111111111111111111111111111111111111111:ZRx2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks