General

  • Target

    2025-04-04_a8433ed2dce68af46d91394a9f3cda7e_black-basta_luca-stealer

  • Size

    12.3MB

  • Sample

    250404-dj36hayvfy

  • MD5

    a8433ed2dce68af46d91394a9f3cda7e

  • SHA1

    7cf1a08230c80f3490b35442b02a19bdbc5ba411

  • SHA256

    750e0e46119245d6c6086debf721e333ecf27061bc22a57b3979bf345f57462c

  • SHA512

    184cb61f981338c70aaee3b50370ce65d050f0a260a30f5af74ee5d108a4afa1ef9467a164f7e9e0b57ca3ccd03ca50ced12ef5c0015cca76bff2ceb9cb2c162

  • SSDEEP

    49152:HiSUBoooooooooooooooooooooooooooooooooooooooooooooooooooooooooon:HbU

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-04_a8433ed2dce68af46d91394a9f3cda7e_black-basta_luca-stealer

    • Size

      12.3MB

    • MD5

      a8433ed2dce68af46d91394a9f3cda7e

    • SHA1

      7cf1a08230c80f3490b35442b02a19bdbc5ba411

    • SHA256

      750e0e46119245d6c6086debf721e333ecf27061bc22a57b3979bf345f57462c

    • SHA512

      184cb61f981338c70aaee3b50370ce65d050f0a260a30f5af74ee5d108a4afa1ef9467a164f7e9e0b57ca3ccd03ca50ced12ef5c0015cca76bff2ceb9cb2c162

    • SSDEEP

      49152:HiSUBoooooooooooooooooooooooooooooooooooooooooooooooooooooooooon:HbU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.