General

  • Target

    2024-11-23_fa7712b50791b07d5dbbe48526c34ac1_karagany_mafia

  • Size

    12.8MB

  • Sample

    241123-yyfzqstpe1

  • MD5

    fa7712b50791b07d5dbbe48526c34ac1

  • SHA1

    f457a42707e66c05d103b91695d31ff85114caa4

  • SHA256

    00b23692bd6690523e4b220291aa8cba00621233aa6b7173f39340140b5c56ba

  • SHA512

    21b7de6d6c6b39e8f9daed599e1a7c974e194717a0f82e40c16aea153c06f72597b8f2e6c3917e913da3a6ca8b0139ed7d4ef9d915e1c8e1e9e41ffda29c9560

  • SSDEEP

    6144:JXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:JXzuKJ8GD96ySzTcANnQMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-23_fa7712b50791b07d5dbbe48526c34ac1_karagany_mafia

    • Size

      12.8MB

    • MD5

      fa7712b50791b07d5dbbe48526c34ac1

    • SHA1

      f457a42707e66c05d103b91695d31ff85114caa4

    • SHA256

      00b23692bd6690523e4b220291aa8cba00621233aa6b7173f39340140b5c56ba

    • SHA512

      21b7de6d6c6b39e8f9daed599e1a7c974e194717a0f82e40c16aea153c06f72597b8f2e6c3917e913da3a6ca8b0139ed7d4ef9d915e1c8e1e9e41ffda29c9560

    • SSDEEP

      6144:JXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:JXzuKJ8GD96ySzTcANnQMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks