General

  • Target

    f777ab88e7988a6197689c84bd5c200b.zip

  • Size

    139KB

  • Sample

    240831-s7h8kasanj

  • MD5

    272f24e38415918b08107bb95e5d4364

  • SHA1

    702a8daad99b19b84b21c8007c0c55a84b036e7c

  • SHA256

    d3ad591f0689b854fe488a00451cafca5f4497ca7ca77718ee48195ad213d830

  • SHA512

    b6f6f2b4de2838bdbd43b54b3a0f98f5e96eb717c052df3916cf2fcd9de87cee037baa704cdc242eee0bf1ece5c357637d68cb267e3d4f6c4dfd24ddaa6cc932

  • SSDEEP

    3072:M+SAS9GztiBgdbBc7H+IA38D+tgKSwrMn8GvwOY3jmCLGQg/U/VT:M+ik/PI7DHJw4lwO+XGn/K

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      cc405e27cf3c45f22534764ed6c2c3d7dc46264b4c275cfc53b3cf6707c211a5

    • Size

      10.1MB

    • MD5

      f777ab88e7988a6197689c84bd5c200b

    • SHA1

      9b8f94fe18fcfcbbb6ca1736751d6ca5ee417766

    • SHA256

      cc405e27cf3c45f22534764ed6c2c3d7dc46264b4c275cfc53b3cf6707c211a5

    • SHA512

      9e9730d5ee6629003f29dcd9193ccd09acfa52256439a8408019273fd12b5c87138de4459d659c63a7eb505cc81039a50767ca33adf687a389a40aeb6ba64436

    • SSDEEP

      12288:Iz+wSUpBMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMs:Iz8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks