General

  • Target

    2024-11-23_81a382a5576df8f00829954dd03dcd9a_karagany_mafia

  • Size

    12.6MB

  • Sample

    241123-yet29asphx

  • MD5

    81a382a5576df8f00829954dd03dcd9a

  • SHA1

    e4af255bf6240265fa8cb8f9bb8a6adef61cbbf6

  • SHA256

    243938a63bcc06a2b08d3801666db579d1ea72aa25c41c772b6a98c9b2d42373

  • SHA512

    4ce8399b9bdacd33df2836c087dcf4dbd2eec1aed5763e988350121113b88f21eee00eebf01886e6b3f598c0460fc2702afaff03d0171db069634928c4d4ea3f

  • SSDEEP

    6144:RXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:RXzuKJ8GD96ySzTcANnQMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-23_81a382a5576df8f00829954dd03dcd9a_karagany_mafia

    • Size

      12.6MB

    • MD5

      81a382a5576df8f00829954dd03dcd9a

    • SHA1

      e4af255bf6240265fa8cb8f9bb8a6adef61cbbf6

    • SHA256

      243938a63bcc06a2b08d3801666db579d1ea72aa25c41c772b6a98c9b2d42373

    • SHA512

      4ce8399b9bdacd33df2836c087dcf4dbd2eec1aed5763e988350121113b88f21eee00eebf01886e6b3f598c0460fc2702afaff03d0171db069634928c4d4ea3f

    • SSDEEP

      6144:RXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:RXzuKJ8GD96ySzTcANnQMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks