Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia

  • Size

    12.4MB

  • Sample

    250212-1ca8gaylcn

  • MD5

    d42fc258c075d0a348732e1c5add285a

  • SHA1

    d5fff320f7fcb7709ced5ef7d075f32d18a6a474

  • SHA256

    344d1f58e5c289a4a9fb84e1a55a938ef1647c1f88a03c59540d503f931a29ff

  • SHA512

    1d90d99a4b1a5ef5957a45bde72c6b811fdd578459d028cdc6ee875989472d90c1e4682f76aa062a6b9c99319314078c26edd86e5eebb74c5b515feba8d21c82

  • SSDEEP

    24576:ipomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:Goo9

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia

    • Size

      12.4MB

    • MD5

      d42fc258c075d0a348732e1c5add285a

    • SHA1

      d5fff320f7fcb7709ced5ef7d075f32d18a6a474

    • SHA256

      344d1f58e5c289a4a9fb84e1a55a938ef1647c1f88a03c59540d503f931a29ff

    • SHA512

      1d90d99a4b1a5ef5957a45bde72c6b811fdd578459d028cdc6ee875989472d90c1e4682f76aa062a6b9c99319314078c26edd86e5eebb74c5b515feba8d21c82

    • SSDEEP

      24576:ipomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:Goo9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks