General

  • Target

    2024-11-03_8af6002a981252a165b5d1e4922816b5_mafia

  • Size

    14.1MB

  • Sample

    241103-yp9kpavrgj

  • MD5

    8af6002a981252a165b5d1e4922816b5

  • SHA1

    c0123dc3b19fdc3946afc95876956980e46357c7

  • SHA256

    a0abc9943a508f9fe58aa49a3d90f88359c97cad7da5e3879dcd5ad86f65a98f

  • SHA512

    56d900a15734a32fbece3831ca9cf0c1a887a3831d11c67fa758cd10681272cbdf4c315ce76c175e304c31328fd35504abb55a45d1d4350280f183a41ea0a2ad

  • SSDEEP

    49152:vVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGW:vVdrl/9zG

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-03_8af6002a981252a165b5d1e4922816b5_mafia

    • Size

      14.1MB

    • MD5

      8af6002a981252a165b5d1e4922816b5

    • SHA1

      c0123dc3b19fdc3946afc95876956980e46357c7

    • SHA256

      a0abc9943a508f9fe58aa49a3d90f88359c97cad7da5e3879dcd5ad86f65a98f

    • SHA512

      56d900a15734a32fbece3831ca9cf0c1a887a3831d11c67fa758cd10681272cbdf4c315ce76c175e304c31328fd35504abb55a45d1d4350280f183a41ea0a2ad

    • SSDEEP

      49152:vVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGW:vVdrl/9zG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks