General

  • Target

    b3d32ed0a3fdd776ba9f3dfcbd7e11cffaebe4ff879b9610c75c331fa4e78225.exe

  • Size

    219KB

  • Sample

    250111-1snthatmgm

  • MD5

    2ffd7895fec9b13e5926be2b55d035b9

  • SHA1

    dc3182698e5878513677dca541016c32e74f37a8

  • SHA256

    b3d32ed0a3fdd776ba9f3dfcbd7e11cffaebe4ff879b9610c75c331fa4e78225

  • SHA512

    ee566d87997374a58cc26425d7fa4643380eb17ff02ea880cb1c4e84f0700c0aeaf61ced9f0ac9551ac646367dc73a9686abba4362405593469abce5cefed909

  • SSDEEP

    3072:hrHIQm9TOcx4AGPmQ2OvWRNqxDJMIeALuIcY3bCl2OVdRUXqHy5kVw+HM:ZHUMPOyJveAao3afQ2VxHM

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      b3d32ed0a3fdd776ba9f3dfcbd7e11cffaebe4ff879b9610c75c331fa4e78225.exe

    • Size

      219KB

    • MD5

      2ffd7895fec9b13e5926be2b55d035b9

    • SHA1

      dc3182698e5878513677dca541016c32e74f37a8

    • SHA256

      b3d32ed0a3fdd776ba9f3dfcbd7e11cffaebe4ff879b9610c75c331fa4e78225

    • SHA512

      ee566d87997374a58cc26425d7fa4643380eb17ff02ea880cb1c4e84f0700c0aeaf61ced9f0ac9551ac646367dc73a9686abba4362405593469abce5cefed909

    • SSDEEP

      3072:hrHIQm9TOcx4AGPmQ2OvWRNqxDJMIeALuIcY3bCl2OVdRUXqHy5kVw+HM:ZHUMPOyJveAao3afQ2VxHM

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks