General

  • Target

    9b90e99043652fd044759bd26e1a6ef0N

  • Size

    71KB

  • Sample

    240909-z2xx4asdqf

  • MD5

    9b90e99043652fd044759bd26e1a6ef0

  • SHA1

    0b2b1752d9b3efb0778cb5f432b8df0f2d24fec9

  • SHA256

    9771659122d068ceb3bcb1965b659b1d16c9f3afd290e058d5feddb667a475ae

  • SHA512

    d2f7ecc6ebf815ec92a7541d615c51f8127ee62671065e27ac62dd96859ce8e08ebd9f397eb993e3565623253b9e16f09e47be6c07a9b02b40f8594cee554e44

  • SSDEEP

    1536:6kss21VCb7jTxSYgOuzTjFWL9bSpIrUc:61VCbrxSYFuzFFpIo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      9b90e99043652fd044759bd26e1a6ef0N

    • Size

      71KB

    • MD5

      9b90e99043652fd044759bd26e1a6ef0

    • SHA1

      0b2b1752d9b3efb0778cb5f432b8df0f2d24fec9

    • SHA256

      9771659122d068ceb3bcb1965b659b1d16c9f3afd290e058d5feddb667a475ae

    • SHA512

      d2f7ecc6ebf815ec92a7541d615c51f8127ee62671065e27ac62dd96859ce8e08ebd9f397eb993e3565623253b9e16f09e47be6c07a9b02b40f8594cee554e44

    • SSDEEP

      1536:6kss21VCb7jTxSYgOuzTjFWL9bSpIrUc:61VCbrxSYFuzFFpIo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.