General

  • Target

    2024-12-07_5142ee56e615a7f396f56d97f28d87ef_karagany_mafia

  • Size

    15.0MB

  • Sample

    241207-w36pvaxqc1

  • MD5

    5142ee56e615a7f396f56d97f28d87ef

  • SHA1

    359af34bdc8073a6326d96208cb629a9120ccb3e

  • SHA256

    2edc2f82a1b10e3d2439c10ac90e8fb2a170840524cb5b04ef96b7ec4a7774d8

  • SHA512

    1d3e92fb559c4c25d878e94a882fb20d6dc683c647d51d51d49ebf9e1d0b1a68e1a191360f296fa32a35ed3e03524eb27281f854fa36d345d9d965e9c280bb73

  • SSDEEP

    6144:RXxZveEydmxZnXNMRaTuMUifWLKxNMMMMMMMbgb:RXzvvygxZnXxr+mxNMMMMMMMbg

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-07_5142ee56e615a7f396f56d97f28d87ef_karagany_mafia

    • Size

      15.0MB

    • MD5

      5142ee56e615a7f396f56d97f28d87ef

    • SHA1

      359af34bdc8073a6326d96208cb629a9120ccb3e

    • SHA256

      2edc2f82a1b10e3d2439c10ac90e8fb2a170840524cb5b04ef96b7ec4a7774d8

    • SHA512

      1d3e92fb559c4c25d878e94a882fb20d6dc683c647d51d51d49ebf9e1d0b1a68e1a191360f296fa32a35ed3e03524eb27281f854fa36d345d9d965e9c280bb73

    • SSDEEP

      6144:RXxZveEydmxZnXNMRaTuMUifWLKxNMMMMMMMbgb:RXzvvygxZnXxr+mxNMMMMMMMbg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks