General

  • Target

    2024-11-06_f4c675ba77abd4b560b6927107f04d5a_mafia

  • Size

    12.6MB

  • Sample

    241106-xpymrawfkq

  • MD5

    f4c675ba77abd4b560b6927107f04d5a

  • SHA1

    a57a67dc9ed2228fb3b02f4289dd632f01f9a82b

  • SHA256

    507aced06e7338e082a63b69fded2e8d40d92c9e15271d3f3ce9b4b564939c72

  • SHA512

    2bb27a269086ed8facedf1daa08e3acfc1b181425c244a25c31dccea7ed85b90caaaf8df241a464b3adefd244aeb49db3f3b14db0adf347cb83b078a32a07e00

  • SSDEEP

    49152:TVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGX:TVdrl/9zG

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-06_f4c675ba77abd4b560b6927107f04d5a_mafia

    • Size

      12.6MB

    • MD5

      f4c675ba77abd4b560b6927107f04d5a

    • SHA1

      a57a67dc9ed2228fb3b02f4289dd632f01f9a82b

    • SHA256

      507aced06e7338e082a63b69fded2e8d40d92c9e15271d3f3ce9b4b564939c72

    • SHA512

      2bb27a269086ed8facedf1daa08e3acfc1b181425c244a25c31dccea7ed85b90caaaf8df241a464b3adefd244aeb49db3f3b14db0adf347cb83b078a32a07e00

    • SSDEEP

      49152:TVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGX:TVdrl/9zG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks