General

  • Target

    2024-11-28_6697ace66a8bbebee54ec3ccfdc544bb_karagany_mafia

  • Size

    13.1MB

  • Sample

    241128-n3sh8awqdz

  • MD5

    6697ace66a8bbebee54ec3ccfdc544bb

  • SHA1

    7d1394713123831c4e6ca86cc43dd244e11374df

  • SHA256

    2364fe2171a548f445d8fd35b0d13c6107fef86c78427c04eb625acd80663125

  • SHA512

    b4552d787a25727829c0d31c841df37957059442e2a185c870109d71e20d3680b1e48a23b885956e08ee1accb8835ac04e2c5bad51c34bb3c610acd37e405fb1

  • SSDEEP

    6144:HyXxZTquqxpXAdbbiFyKq3nUOcWfMMMMMMMbt:HyXzN8pXAdbbyyZtZfMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-28_6697ace66a8bbebee54ec3ccfdc544bb_karagany_mafia

    • Size

      13.1MB

    • MD5

      6697ace66a8bbebee54ec3ccfdc544bb

    • SHA1

      7d1394713123831c4e6ca86cc43dd244e11374df

    • SHA256

      2364fe2171a548f445d8fd35b0d13c6107fef86c78427c04eb625acd80663125

    • SHA512

      b4552d787a25727829c0d31c841df37957059442e2a185c870109d71e20d3680b1e48a23b885956e08ee1accb8835ac04e2c5bad51c34bb3c610acd37e405fb1

    • SSDEEP

      6144:HyXxZTquqxpXAdbbiFyKq3nUOcWfMMMMMMMbt:HyXzN8pXAdbbyyZtZfMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks