General

  • Target

    HBTX-sam.zip

  • Size

    988KB

  • Sample

    250130-gknc8ayqcj

  • MD5

    6a146a16680937765e073215f548824b

  • SHA1

    a9ab00a2f85b5998455cb7369fec956b6ea5cf43

  • SHA256

    22525c8a7671fc0c1bd018d0e03157152be106f503179a31281aebfa79d693a7

  • SHA512

    eac7a71b26fb2c3f5b3490c16c68260b0048ef50018f30b30286c40955a7f90f8c41c21e4ea3523f1e9e0c3cf7bc684cae93460816bae2e864e8de4d682426af

  • SSDEEP

    24576:zrtf6XBsdDD4kgWuAYEb3d48yDgJUboGFIPf6:vd6XB8DUkSpEb3d48CgiboGKPf6

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      27ff12db2c2d5d3021e777fadc1e93be4ae4cd3ebc0fd0b45d6f98fcbcb3f704

    • Size

      10.4MB

    • MD5

      294edd017790046d81c0b3b38ea28f3e

    • SHA1

      ab3d536beb0e7b529a3dc544aaf4af85f2344675

    • SHA256

      27ff12db2c2d5d3021e777fadc1e93be4ae4cd3ebc0fd0b45d6f98fcbcb3f704

    • SHA512

      053d54668bcf7ebac796085d1be12d27ea784dd8e1b60bc3f626c81ce890809253b7ad4107448a500bba3a00e1cf38d38cbba014efb226854db2ff78917d5d74

    • SSDEEP

      49152:dYq2SzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAzAz:dYR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks