General

  • Target

    2024-08-15_febc322e414acbc8e52470c0d4f5309a_mafia

  • Size

    11.1MB

  • Sample

    240815-zbnazaxdkk

  • MD5

    febc322e414acbc8e52470c0d4f5309a

  • SHA1

    4c46c19bfc111b8941a87ea27ab615250559cbe7

  • SHA256

    e3b6a8b0c0f4599ed03d7a8b7cd16bb829ebebab9ed8c61f456e2545540c5aae

  • SHA512

    73ca6cc0084b9f398cfc2663a3a9fc20c53097f46230938b9ab83d90d08fa8fafc69cdc9f452f0b1c39141c289b11cab7fb1373cb07f5fb724777d3800c23c39

  • SSDEEP

    6144:L+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:L+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-08-15_febc322e414acbc8e52470c0d4f5309a_mafia

    • Size

      11.1MB

    • MD5

      febc322e414acbc8e52470c0d4f5309a

    • SHA1

      4c46c19bfc111b8941a87ea27ab615250559cbe7

    • SHA256

      e3b6a8b0c0f4599ed03d7a8b7cd16bb829ebebab9ed8c61f456e2545540c5aae

    • SHA512

      73ca6cc0084b9f398cfc2663a3a9fc20c53097f46230938b9ab83d90d08fa8fafc69cdc9f452f0b1c39141c289b11cab7fb1373cb07f5fb724777d3800c23c39

    • SSDEEP

      6144:L+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:L+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks