General

  • Target

    2024-06-27_ab72c9822cad584b7c2c45d71af1f65a_mafia

  • Size

    10.7MB

  • Sample

    240627-y5hf5syepg

  • MD5

    ab72c9822cad584b7c2c45d71af1f65a

  • SHA1

    46af88432a76922821ff7ad1445c626057038c36

  • SHA256

    19364eea0c21e5c21e4faf9be89ae202d55c9013a5ab87963675407ba3618f47

  • SHA512

    84d7e68f5c9d0895d093504492f0893883678c08218bbb62fc173bbf35dcb027145efe908e86b11bb5035175313f71f725a254e05ca2f859de57780e154038ea

  • SSDEEP

    6144:R+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:R+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-06-27_ab72c9822cad584b7c2c45d71af1f65a_mafia

    • Size

      10.7MB

    • MD5

      ab72c9822cad584b7c2c45d71af1f65a

    • SHA1

      46af88432a76922821ff7ad1445c626057038c36

    • SHA256

      19364eea0c21e5c21e4faf9be89ae202d55c9013a5ab87963675407ba3618f47

    • SHA512

      84d7e68f5c9d0895d093504492f0893883678c08218bbb62fc173bbf35dcb027145efe908e86b11bb5035175313f71f725a254e05ca2f859de57780e154038ea

    • SSDEEP

      6144:R+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:R+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks