General

  • Target

    2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader

  • Size

    13.9MB

  • Sample

    250330-lamfdsxpy7

  • MD5

    44060047c09b10a66899ce012387c5c3

  • SHA1

    d7f0f95a1f168c74dcf2109e280d3da40af6f904

  • SHA256

    6542df9290b0e3312e5c6d143461b5258901597514b7cb3aed1280c8271041eb

  • SHA512

    d1258de502f4b38d3aee82ab8f978e9593e85f5b222ea05a9558fa1515b5e622daf08b8e936439c274a5c59242ec75c15df63f5d3580afcf56af31c8e73568ae

  • SSDEEP

    3072:AZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrb:UnJjcngGSrlqFp6kCyxTT

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader

    • Size

      13.9MB

    • MD5

      44060047c09b10a66899ce012387c5c3

    • SHA1

      d7f0f95a1f168c74dcf2109e280d3da40af6f904

    • SHA256

      6542df9290b0e3312e5c6d143461b5258901597514b7cb3aed1280c8271041eb

    • SHA512

      d1258de502f4b38d3aee82ab8f978e9593e85f5b222ea05a9558fa1515b5e622daf08b8e936439c274a5c59242ec75c15df63f5d3580afcf56af31c8e73568ae

    • SSDEEP

      3072:AZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrb:UnJjcngGSrlqFp6kCyxTT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks