General

  • Target

    2024-11-20_6c97afac7078c36833ebcfbcf96fad8e_karagany_mafia

  • Size

    13.9MB

  • Sample

    241120-xcpt3ssamr

  • MD5

    6c97afac7078c36833ebcfbcf96fad8e

  • SHA1

    233ec0aab053ccc77ec31026dd8d0f4223ca61b9

  • SHA256

    38e91b481571df6513b3f932c2f51bda07d4a0c35c45e690e3643ee98c3b47db

  • SHA512

    181baf50cc579b52301b71ac22ba06c0e242a592fcdab6c5bfc491186060c7ef579ed69df2c3c5a9b89fe471a288a367bf2ce5391e46de3f62f024046f8354e1

  • SSDEEP

    6144:UXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:UXzuKJ8GD96ySzTcANnQMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-20_6c97afac7078c36833ebcfbcf96fad8e_karagany_mafia

    • Size

      13.9MB

    • MD5

      6c97afac7078c36833ebcfbcf96fad8e

    • SHA1

      233ec0aab053ccc77ec31026dd8d0f4223ca61b9

    • SHA256

      38e91b481571df6513b3f932c2f51bda07d4a0c35c45e690e3643ee98c3b47db

    • SHA512

      181baf50cc579b52301b71ac22ba06c0e242a592fcdab6c5bfc491186060c7ef579ed69df2c3c5a9b89fe471a288a367bf2ce5391e46de3f62f024046f8354e1

    • SSDEEP

      6144:UXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:UXzuKJ8GD96ySzTcANnQMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks