General

  • Target

    2025-05-08_ecd65d8526b550e4acc76e10bd3f5dbc_black-basta_elex_gcleaner_luca-stealer_smoke-loader

  • Size

    13.9MB

  • Sample

    250508-hcwv3a1nv3

  • MD5

    ecd65d8526b550e4acc76e10bd3f5dbc

  • SHA1

    91e11ca30e152fedd3d22c6c24c86a975ecb4133

  • SHA256

    c3ad72f45e405a72df8934a29e46320a1b843c1161d3f9b776e49dabd32a9a1e

  • SHA512

    6028e8ea92867e4772b6407254724b6020947de0a01a83ddf436e1d4353c85a1f7a97ece5758fe160d5878493670f180b7e7e34e922a80a2b823e516852f02c1

  • SSDEEP

    3072:oZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrI:MnJjcngGSrlqFp6kCyxTA

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-05-08_ecd65d8526b550e4acc76e10bd3f5dbc_black-basta_elex_gcleaner_luca-stealer_smoke-loader

    • Size

      13.9MB

    • MD5

      ecd65d8526b550e4acc76e10bd3f5dbc

    • SHA1

      91e11ca30e152fedd3d22c6c24c86a975ecb4133

    • SHA256

      c3ad72f45e405a72df8934a29e46320a1b843c1161d3f9b776e49dabd32a9a1e

    • SHA512

      6028e8ea92867e4772b6407254724b6020947de0a01a83ddf436e1d4353c85a1f7a97ece5758fe160d5878493670f180b7e7e34e922a80a2b823e516852f02c1

    • SSDEEP

      3072:oZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrI:MnJjcngGSrlqFp6kCyxTA

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »