General

  • Target

    c27d37da65b9d244270eb3d627f065bb

  • Size

    13.3MB

  • Sample

    240312-fgcxmsgh5s

  • MD5

    c27d37da65b9d244270eb3d627f065bb

  • SHA1

    96e30980faec03358197f26aa4ab0709bc2144d2

  • SHA256

    8db4453def55be9cad5dcc2ae5169bbcb2bd201b859955d709dc4fc4cb6430d7

  • SHA512

    e89b3b543d38686b29f12e27f16d99a6d8e904179f016e2f17cdc58e9ce1d0f667762ba58e312b6b249f611a4c61050e62c2a29a2a32ade435da7e8ec88a885b

  • SSDEEP

    196608:ZRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRj:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      c27d37da65b9d244270eb3d627f065bb

    • Size

      13.3MB

    • MD5

      c27d37da65b9d244270eb3d627f065bb

    • SHA1

      96e30980faec03358197f26aa4ab0709bc2144d2

    • SHA256

      8db4453def55be9cad5dcc2ae5169bbcb2bd201b859955d709dc4fc4cb6430d7

    • SHA512

      e89b3b543d38686b29f12e27f16d99a6d8e904179f016e2f17cdc58e9ce1d0f667762ba58e312b6b249f611a4c61050e62c2a29a2a32ade435da7e8ec88a885b

    • SSDEEP

      196608:ZRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRj:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks