General

  • Target

    2024-09-21_df21224853d1acdcaa4665833b1ae5f6_mafia

  • Size

    13.5MB

  • Sample

    240921-yf5kdazekj

  • MD5

    df21224853d1acdcaa4665833b1ae5f6

  • SHA1

    2a882a20037cba879454673069abe388f03527dc

  • SHA256

    06034b65a352da9d58f9c1cd9ce5c86cd898f7b5a0edcdc5ff346246bff7d9c7

  • SHA512

    f0a54259984fd809e7fd7b6075446fd1442a3a79db5255380e04ba49d872e9eee9a06421e2e68f2b0dff9499d68730b34a67a3019a6e79a6efae830e91043443

  • SSDEEP

    6144:X+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:X+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-09-21_df21224853d1acdcaa4665833b1ae5f6_mafia

    • Size

      13.5MB

    • MD5

      df21224853d1acdcaa4665833b1ae5f6

    • SHA1

      2a882a20037cba879454673069abe388f03527dc

    • SHA256

      06034b65a352da9d58f9c1cd9ce5c86cd898f7b5a0edcdc5ff346246bff7d9c7

    • SHA512

      f0a54259984fd809e7fd7b6075446fd1442a3a79db5255380e04ba49d872e9eee9a06421e2e68f2b0dff9499d68730b34a67a3019a6e79a6efae830e91043443

    • SSDEEP

      6144:X+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:X+r1IeSXMXc7LlxWV4Ug97GZ+ej

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks