General

  • Target

    b79e3ee1a65ad2cb3d8e6056ccd6f881

  • Size

    12.7MB

  • Sample

    240306-rpelzscg7x

  • MD5

    b79e3ee1a65ad2cb3d8e6056ccd6f881

  • SHA1

    1876b78c93ad6a591bfca8f53cd34484a43eca3b

  • SHA256

    4c60bfe82bee8e9fba230f67fdd0d3f1866b1b108b0075d4ceb997f53a6b3a24

  • SHA512

    a71a2653b1a1a443377ec1671867bb03461127c841ebba4f1b49434601a0b65627f0f61de47cc019390618347fa79977a87b88290f96cecb994932d13c0d4f2e

  • SSDEEP

    49152:FzCf1zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzH:M

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      b79e3ee1a65ad2cb3d8e6056ccd6f881

    • Size

      12.7MB

    • MD5

      b79e3ee1a65ad2cb3d8e6056ccd6f881

    • SHA1

      1876b78c93ad6a591bfca8f53cd34484a43eca3b

    • SHA256

      4c60bfe82bee8e9fba230f67fdd0d3f1866b1b108b0075d4ceb997f53a6b3a24

    • SHA512

      a71a2653b1a1a443377ec1671867bb03461127c841ebba4f1b49434601a0b65627f0f61de47cc019390618347fa79977a87b88290f96cecb994932d13c0d4f2e

    • SSDEEP

      49152:FzCf1zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzH:M

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks