General

  • Target

    2024-12-19_53085a6f8df30225e3546188424dab11_mafia

  • Size

    14.0MB

  • Sample

    241219-rq482atqcw

  • MD5

    53085a6f8df30225e3546188424dab11

  • SHA1

    688763bc7f35c3a97fb879e5d3b3d496efc8faf7

  • SHA256

    036bf4e675789eddebe930cd43ba1d35ff11b070146d7924d227a8332bc5d2c5

  • SHA512

    ff7fd4b243b05a24016cb3861ad258e1d7c5d9c1a079f171f97b7d0034480d3bdb7b8c0404200e98824e60fe36d26bf54b6eb564df4caa18144aa4969fb217de

  • SSDEEP

    6144:ZN7EUevPsS7JFxs3ba86/YsUvSaUo2lt/XUANtvcBNCxkNbnKWrLHtHtHtHtHtHl:ZpbevZK3baxY/SGtAN5cBNC0H

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-19_53085a6f8df30225e3546188424dab11_mafia

    • Size

      14.0MB

    • MD5

      53085a6f8df30225e3546188424dab11

    • SHA1

      688763bc7f35c3a97fb879e5d3b3d496efc8faf7

    • SHA256

      036bf4e675789eddebe930cd43ba1d35ff11b070146d7924d227a8332bc5d2c5

    • SHA512

      ff7fd4b243b05a24016cb3861ad258e1d7c5d9c1a079f171f97b7d0034480d3bdb7b8c0404200e98824e60fe36d26bf54b6eb564df4caa18144aa4969fb217de

    • SSDEEP

      6144:ZN7EUevPsS7JFxs3ba86/YsUvSaUo2lt/XUANtvcBNCxkNbnKWrLHtHtHtHtHtHl:ZpbevZK3baxY/SGtAN5cBNC0H

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks