General

  • Target

    2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2.exe

  • Size

    13.2MB

  • Sample

    241123-n2xrjs1jck

  • MD5

    290911ada19cf5f4241acd5beadb4fa8

  • SHA1

    0ba3021f83536da222ac06c3881e24e8ef5fc485

  • SHA256

    2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2

  • SHA512

    41b9faa33bddb614c547dd36b908c05cb14323b88ca26198ed8ea479f7656a89a95b8a38a9b32b24c2be8c6f9fd442f55845c52fb067fe546f7dc86c85cede2c

  • SSDEEP

    49152:MIc6CLNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNX:1c6Cd

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2.exe

    • Size

      13.2MB

    • MD5

      290911ada19cf5f4241acd5beadb4fa8

    • SHA1

      0ba3021f83536da222ac06c3881e24e8ef5fc485

    • SHA256

      2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2

    • SHA512

      41b9faa33bddb614c547dd36b908c05cb14323b88ca26198ed8ea479f7656a89a95b8a38a9b32b24c2be8c6f9fd442f55845c52fb067fe546f7dc86c85cede2c

    • SSDEEP

      49152:MIc6CLNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNX:1c6Cd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks