General

  • Target

    pukix.exe

  • Size

    1.0MB

  • Sample

    240425-ds446aec65

  • MD5

    7c93e4041e21ef8e4d45f7343abcae94

  • SHA1

    146bc0e573b4dca3f38c147477e6c7fcabe536b3

  • SHA256

    2c82e9c61a9213ce1a25357b667d6929772bc8ad4324db38e8dd7f00c00eacc6

  • SHA512

    75903fabcf9c645f5caad2494c677d8e7e3c7a1d8a39e400fa8aea685d32e3253f0ce0423af4dba99a7e5a054b69ef48b5475d814de539574b2192794fcfedda

  • SSDEEP

    24576:ykMXdjSpUjdjKIDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDr:yBXhSq1PDDDDDDDDDDDDDDDDDDDDDDD7

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      pukix.exe

    • Size

      1.0MB

    • MD5

      7c93e4041e21ef8e4d45f7343abcae94

    • SHA1

      146bc0e573b4dca3f38c147477e6c7fcabe536b3

    • SHA256

      2c82e9c61a9213ce1a25357b667d6929772bc8ad4324db38e8dd7f00c00eacc6

    • SHA512

      75903fabcf9c645f5caad2494c677d8e7e3c7a1d8a39e400fa8aea685d32e3253f0ce0423af4dba99a7e5a054b69ef48b5475d814de539574b2192794fcfedda

    • SSDEEP

      24576:ykMXdjSpUjdjKIDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDr:yBXhSq1PDDDDDDDDDDDDDDDDDDDDDDD7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks