General

  • Target

    2025-03-30_f5d41f5e256ffe9d02a1c075ef203801_black-basta_luca-stealer

  • Size

    11.1MB

  • Sample

    250330-k684lavxf1

  • MD5

    f5d41f5e256ffe9d02a1c075ef203801

  • SHA1

    4fe639d7a221b0d7a2453b35656b378eb9a4bc10

  • SHA256

    00f0baa85e6ff72bae73389b37b84171bc0bb4f8b599fc58afaa65578f16e793

  • SHA512

    3f878feaa54111c9978cd29e2d0a9bd2f1df920747462ebe9d78f6d55a5318c3d14f48411919be81af643afba780db55c3a43e99f8754b6d042244c14095e754

  • SSDEEP

    12288:3QvccP/JGo5IdddddddddddddddddddddddddddddddddddddddddddddddddddV:gvcMAQY

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_f5d41f5e256ffe9d02a1c075ef203801_black-basta_luca-stealer

    • Size

      11.1MB

    • MD5

      f5d41f5e256ffe9d02a1c075ef203801

    • SHA1

      4fe639d7a221b0d7a2453b35656b378eb9a4bc10

    • SHA256

      00f0baa85e6ff72bae73389b37b84171bc0bb4f8b599fc58afaa65578f16e793

    • SHA512

      3f878feaa54111c9978cd29e2d0a9bd2f1df920747462ebe9d78f6d55a5318c3d14f48411919be81af643afba780db55c3a43e99f8754b6d042244c14095e754

    • SSDEEP

      12288:3QvccP/JGo5IdddddddddddddddddddddddddddddddddddddddddddddddddddV:gvcMAQY

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks