General

  • Target

    2024-08-30_ee64939627d553fe824c36c173282baf_mafia

  • Size

    12.3MB

  • Sample

    240830-22b2qs1emf

  • MD5

    ee64939627d553fe824c36c173282baf

  • SHA1

    aa52d0075d52ed759a0732de76f9116c72d618b5

  • SHA256

    97b150d3c7d68e35a8601d95ba0f43ac9b83b61179a3260a29347ba880993ced

  • SHA512

    dd50fe0c89f36e8d3c4fa98bbecb0014087da7974c820584f133015a476c00cdd1a31acd75867b7fae77159f5139564c3d3dda00befcecfb5a5c3c7b470cbc3b

  • SSDEEP

    6144:x+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:x+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-08-30_ee64939627d553fe824c36c173282baf_mafia

    • Size

      12.3MB

    • MD5

      ee64939627d553fe824c36c173282baf

    • SHA1

      aa52d0075d52ed759a0732de76f9116c72d618b5

    • SHA256

      97b150d3c7d68e35a8601d95ba0f43ac9b83b61179a3260a29347ba880993ced

    • SHA512

      dd50fe0c89f36e8d3c4fa98bbecb0014087da7974c820584f133015a476c00cdd1a31acd75867b7fae77159f5139564c3d3dda00befcecfb5a5c3c7b470cbc3b

    • SSDEEP

      6144:x+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:x+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks