General

  • Target

    2024-12-02_381220f55364f3e5f8b90d364c4e261e_karagany_mafia

  • Size

    11.0MB

  • Sample

    241202-whe2dsvngy

  • MD5

    381220f55364f3e5f8b90d364c4e261e

  • SHA1

    93afa3203eb7a1031f934fcac6f9d8b0989a8aa3

  • SHA256

    e8ae4d92a862230549c7d6f0992f2d83f07520c6716f0db33710a09dfe3f4c04

  • SHA512

    9be95c05b73f786203a8d3945f081a24c9c4ac6fb3665a57ea212a108c15070aad6fe2c70906231bdb4132d6f557fdecbbe91e3fe26e7b18b8f1971e08d089ad

  • SSDEEP

    6144:tXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:tXzuKJ8GD96ySzTcANnQMMMMMMMb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-02_381220f55364f3e5f8b90d364c4e261e_karagany_mafia

    • Size

      11.0MB

    • MD5

      381220f55364f3e5f8b90d364c4e261e

    • SHA1

      93afa3203eb7a1031f934fcac6f9d8b0989a8aa3

    • SHA256

      e8ae4d92a862230549c7d6f0992f2d83f07520c6716f0db33710a09dfe3f4c04

    • SHA512

      9be95c05b73f786203a8d3945f081a24c9c4ac6fb3665a57ea212a108c15070aad6fe2c70906231bdb4132d6f557fdecbbe91e3fe26e7b18b8f1971e08d089ad

    • SSDEEP

      6144:tXxZs2EcxJ8GD96ySzTVaFRFX53ncNnUUMMMMMMMMb5:tXzuKJ8GD96ySzTcANnQMMMMMMMb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks