General
-
Target
de6b0434de35cf7e80ca010ea9c0bd03
-
Size
10.7MB
-
Sample
240325-tnm8vafd3v
-
MD5
de6b0434de35cf7e80ca010ea9c0bd03
-
SHA1
1465db214939cdf236463023b37ec908d97bf4e5
-
SHA256
b33a01548088b02d5ef5e727d704cb0f60adb233a8c0592e59ff4c69204cb9e1
-
SHA512
df25341fcfbe0c16e563958c0d10d5f09d7b61651d8a0c22d4cd24924372a352ccd7c01de9d0a51e550b984001dda389269c08f7029487c38a5de8799bdfe1b9
-
SSDEEP
49152:jyjfVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV3:
Static task
static1
Behavioral task
behavioral1
Sample
de6b0434de35cf7e80ca010ea9c0bd03.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de6b0434de35cf7e80ca010ea9c0bd03.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
de6b0434de35cf7e80ca010ea9c0bd03
-
Size
10.7MB
-
MD5
de6b0434de35cf7e80ca010ea9c0bd03
-
SHA1
1465db214939cdf236463023b37ec908d97bf4e5
-
SHA256
b33a01548088b02d5ef5e727d704cb0f60adb233a8c0592e59ff4c69204cb9e1
-
SHA512
df25341fcfbe0c16e563958c0d10d5f09d7b61651d8a0c22d4cd24924372a352ccd7c01de9d0a51e550b984001dda389269c08f7029487c38a5de8799bdfe1b9
-
SSDEEP
49152:jyjfVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV3:
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2