General

  • Target

    2024-11-28_06bd1eaff94ed6673544a046395e863a_karagany_mafia

  • Size

    11.3MB

  • Sample

    241128-w3k35swkct

  • MD5

    06bd1eaff94ed6673544a046395e863a

  • SHA1

    986cff31eda9d82dd0a461181c59d804fc6b3caf

  • SHA256

    103d6f764e3a1d823563157557c9a5d875596f28fb1d305a361309832beed07c

  • SHA512

    9d7bfeef59c3110926d3379ac6a53c76e59449de890d3dc1481c2985cbe3cd6e6fc7d28eaf2a73749722cc2e3bad713f9dc0bb2cd097a3c78169c23a62f674e1

  • SSDEEP

    6144:wXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:wXzuKJ8GD96ySzTcANnQMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-28_06bd1eaff94ed6673544a046395e863a_karagany_mafia

    • Size

      11.3MB

    • MD5

      06bd1eaff94ed6673544a046395e863a

    • SHA1

      986cff31eda9d82dd0a461181c59d804fc6b3caf

    • SHA256

      103d6f764e3a1d823563157557c9a5d875596f28fb1d305a361309832beed07c

    • SHA512

      9d7bfeef59c3110926d3379ac6a53c76e59449de890d3dc1481c2985cbe3cd6e6fc7d28eaf2a73749722cc2e3bad713f9dc0bb2cd097a3c78169c23a62f674e1

    • SSDEEP

      6144:wXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:wXzuKJ8GD96ySzTcANnQMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks