General

  • Target

    6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6

  • Size

    13.4MB

  • Sample

    250105-ymst6atrc1

  • MD5

    a43bf1a91d2d7d2c0350593078a95fe5

  • SHA1

    685f6b436510395fee228855f2b3842266e0710c

  • SHA256

    6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6

  • SHA512

    43ae85a0230abc37a7909d512e93cfcf09c19602c9bc1064bec988cf08ee8f8b159a47daff55af3804cd335356a1c43a04e951875029a936215cfb95adb0cf9b

  • SSDEEP

    1536:h0wSS5v4kCdJwumQA1tdc+2ogPM90svCW3jpNUB5X2CEjrpf9IwqdNdBgotfYn58:hSSePdJwhhy690sKqpyB8xpGwUptf6e

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6

    • Size

      13.4MB

    • MD5

      a43bf1a91d2d7d2c0350593078a95fe5

    • SHA1

      685f6b436510395fee228855f2b3842266e0710c

    • SHA256

      6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6

    • SHA512

      43ae85a0230abc37a7909d512e93cfcf09c19602c9bc1064bec988cf08ee8f8b159a47daff55af3804cd335356a1c43a04e951875029a936215cfb95adb0cf9b

    • SSDEEP

      1536:h0wSS5v4kCdJwumQA1tdc+2ogPM90svCW3jpNUB5X2CEjrpf9IwqdNdBgotfYn58:hSSePdJwhhy690sKqpyB8xpGwUptf6e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks