General

  • Target

    2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2.exe

  • Size

    13.2MB

  • Sample

    241123-n4faaatrgs

  • MD5

    290911ada19cf5f4241acd5beadb4fa8

  • SHA1

    0ba3021f83536da222ac06c3881e24e8ef5fc485

  • SHA256

    2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2

  • SHA512

    41b9faa33bddb614c547dd36b908c05cb14323b88ca26198ed8ea479f7656a89a95b8a38a9b32b24c2be8c6f9fd442f55845c52fb067fe546f7dc86c85cede2c

  • SSDEEP

    49152:MIc6CLNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNX:1c6Cd

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2.exe

    • Size

      13.2MB

    • MD5

      290911ada19cf5f4241acd5beadb4fa8

    • SHA1

      0ba3021f83536da222ac06c3881e24e8ef5fc485

    • SHA256

      2b76348a2a85a684600ced4c9ebfe496bfcf46ff451c93d841b1c473fd03a7d2

    • SHA512

      41b9faa33bddb614c547dd36b908c05cb14323b88ca26198ed8ea479f7656a89a95b8a38a9b32b24c2be8c6f9fd442f55845c52fb067fe546f7dc86c85cede2c

    • SSDEEP

      49152:MIc6CLNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNX:1c6Cd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.