General

  • Target

    2024-06-19_1932fb6241c0289d22070878376228fc_mafia

  • Size

    14.0MB

  • Sample

    240619-ywskrazbjc

  • MD5

    1932fb6241c0289d22070878376228fc

  • SHA1

    27db774790b7ebd0712b648c5f9fa82b3623dce6

  • SHA256

    e56b8bcd55798f1bcd8e2775fe58a49912117aa0158b70550470d130fa63c220

  • SHA512

    2125dbd7cf37b249ec141d9bbb9616cd492aff0b83c798741df8b195544e8eb22e0c012b5cacce32ca0dfba3a0b33184db03381b70aebcf1cb8f43d80bbf270a

  • SSDEEP

    6144:i+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:i+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-06-19_1932fb6241c0289d22070878376228fc_mafia

    • Size

      14.0MB

    • MD5

      1932fb6241c0289d22070878376228fc

    • SHA1

      27db774790b7ebd0712b648c5f9fa82b3623dce6

    • SHA256

      e56b8bcd55798f1bcd8e2775fe58a49912117aa0158b70550470d130fa63c220

    • SHA512

      2125dbd7cf37b249ec141d9bbb9616cd492aff0b83c798741df8b195544e8eb22e0c012b5cacce32ca0dfba3a0b33184db03381b70aebcf1cb8f43d80bbf270a

    • SSDEEP

      6144:i+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:i+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks