General

  • Target

    2024-11-10_861e7f93d3c3d79d24b078e4374b973d_mafia

  • Size

    13.5MB

  • Sample

    241110-xm59taslgx

  • MD5

    861e7f93d3c3d79d24b078e4374b973d

  • SHA1

    3a70ea015c1aba48c3e285ed694a65e822af1d30

  • SHA256

    d5e651b38925b1b4b78855763b6c32835fad21aa11855cb96001a7d1eb2937fe

  • SHA512

    f8f73f705d3be465857becb4e44d4fec07afcd16bb0dbbae4d80b99f3c2b096740e644f7332c59ead8f9a557b5d43f82c3c21fe010e9d3ae22542176bdbec029

  • SSDEEP

    49152:FVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGH:FVdrl/9zG

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-11-10_861e7f93d3c3d79d24b078e4374b973d_mafia

    • Size

      13.5MB

    • MD5

      861e7f93d3c3d79d24b078e4374b973d

    • SHA1

      3a70ea015c1aba48c3e285ed694a65e822af1d30

    • SHA256

      d5e651b38925b1b4b78855763b6c32835fad21aa11855cb96001a7d1eb2937fe

    • SHA512

      f8f73f705d3be465857becb4e44d4fec07afcd16bb0dbbae4d80b99f3c2b096740e644f7332c59ead8f9a557b5d43f82c3c21fe010e9d3ae22542176bdbec029

    • SSDEEP

      49152:FVdrl/8HAzGCbGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGH:FVdrl/9zG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks