General

  • Target

    2024-08-24_2b01b8549776e835eb9764a447a8a8c6_mafia

  • Size

    12.0MB

  • Sample

    240824-zy5hrszbph

  • MD5

    2b01b8549776e835eb9764a447a8a8c6

  • SHA1

    30bebb315c168df16508f91dca22891de9860c7e

  • SHA256

    dd5b575cf505ec7b9589b110df66c9c7f508cce7241086eff387040beeab65da

  • SHA512

    1f9d77fb159f52651f3adc504ea921ff90c2371cd1d100ddcca7e6f107e483e7afc74197655e418b8ff6fa01ca47215da3e85699bdef0f09ea24a52df48422f5

  • SSDEEP

    6144:o+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:o+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-08-24_2b01b8549776e835eb9764a447a8a8c6_mafia

    • Size

      12.0MB

    • MD5

      2b01b8549776e835eb9764a447a8a8c6

    • SHA1

      30bebb315c168df16508f91dca22891de9860c7e

    • SHA256

      dd5b575cf505ec7b9589b110df66c9c7f508cce7241086eff387040beeab65da

    • SHA512

      1f9d77fb159f52651f3adc504ea921ff90c2371cd1d100ddcca7e6f107e483e7afc74197655e418b8ff6fa01ca47215da3e85699bdef0f09ea24a52df48422f5

    • SSDEEP

      6144:o+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:o+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks