General

  • Target

    2024-06-21_4d008590e35f6c10978325d00d7ad99d_mafia

  • Size

    11.4MB

  • Sample

    240621-yr4gfsvcnl

  • MD5

    4d008590e35f6c10978325d00d7ad99d

  • SHA1

    6cd4a20419f653ecc58493813272cbe3e3915479

  • SHA256

    a5ce7274373a42e600ecc51ee6e6122033928f05a282c62410889f36e31320c5

  • SHA512

    3a1db5b7800d1f628291c0b4b765059d271c85a471241b2886d4551050970ac08a219281da563f8eb3375199fca713da116d825695812e0382561d4d0fccb561

  • SSDEEP

    6144:9+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:9+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-06-21_4d008590e35f6c10978325d00d7ad99d_mafia

    • Size

      11.4MB

    • MD5

      4d008590e35f6c10978325d00d7ad99d

    • SHA1

      6cd4a20419f653ecc58493813272cbe3e3915479

    • SHA256

      a5ce7274373a42e600ecc51ee6e6122033928f05a282c62410889f36e31320c5

    • SHA512

      3a1db5b7800d1f628291c0b4b765059d271c85a471241b2886d4551050970ac08a219281da563f8eb3375199fca713da116d825695812e0382561d4d0fccb561

    • SSDEEP

      6144:9+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:9+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks