General

  • Target

    2563e3d6d4c2a649c74dc12e6f361723e9ccb6ff5405928db9279311be996e01N.exe

  • Size

    179KB

  • Sample

    250205-abs4sa1jfk

  • MD5

    34e79a57341c6f1742e6c342faa1aef0

  • SHA1

    57949ba2e6f262fe075f2dd5846c4a5f3b3da8aa

  • SHA256

    2563e3d6d4c2a649c74dc12e6f361723e9ccb6ff5405928db9279311be996e01

  • SHA512

    36f8b826da188d4265b2a68a8a8053b74e18ae96ec12ecda19be3e19a9fa7558a201370f8a556dba9df4ea371a21f6c9848f7882486c55b74fbc8665f71ac1cd

  • SSDEEP

    3072:npTvjrvSCFMGIZqYSVU2cxi2b8YSispChVn/30LvgHPDRuVlSTPW3N30:nJ3v1FzIZqYyU2+EYokhVn/kz2PDEVQ

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2563e3d6d4c2a649c74dc12e6f361723e9ccb6ff5405928db9279311be996e01N.exe

    • Size

      179KB

    • MD5

      34e79a57341c6f1742e6c342faa1aef0

    • SHA1

      57949ba2e6f262fe075f2dd5846c4a5f3b3da8aa

    • SHA256

      2563e3d6d4c2a649c74dc12e6f361723e9ccb6ff5405928db9279311be996e01

    • SHA512

      36f8b826da188d4265b2a68a8a8053b74e18ae96ec12ecda19be3e19a9fa7558a201370f8a556dba9df4ea371a21f6c9848f7882486c55b74fbc8665f71ac1cd

    • SSDEEP

      3072:npTvjrvSCFMGIZqYSVU2cxi2b8YSispChVn/30LvgHPDRuVlSTPW3N30:nJ3v1FzIZqYyU2+EYokhVn/kz2PDEVQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks