General

  • Target

    2024-12-19_08354967a1a2f5d0c78d5c7d0a80a9bf_mafia

  • Size

    11.3MB

  • Sample

    241219-t8knfswndl

  • MD5

    08354967a1a2f5d0c78d5c7d0a80a9bf

  • SHA1

    65c97fda58d573ad7aaa0677c7d4323a35bd67ed

  • SHA256

    c46a5bf2d8001c12538128dec7dbc3563ee98be85f7403624bf48b9e4725d82e

  • SHA512

    66f404ddcba83f7c5514a8c5f00254177a079361bb72fa0c16fa8094c021b231adf9cc9c978db7f00c261b88c86cb5cac24aac6f20b818847943ac80d995d271

  • SSDEEP

    3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:yOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-19_08354967a1a2f5d0c78d5c7d0a80a9bf_mafia

    • Size

      11.3MB

    • MD5

      08354967a1a2f5d0c78d5c7d0a80a9bf

    • SHA1

      65c97fda58d573ad7aaa0677c7d4323a35bd67ed

    • SHA256

      c46a5bf2d8001c12538128dec7dbc3563ee98be85f7403624bf48b9e4725d82e

    • SHA512

      66f404ddcba83f7c5514a8c5f00254177a079361bb72fa0c16fa8094c021b231adf9cc9c978db7f00c261b88c86cb5cac24aac6f20b818847943ac80d995d271

    • SSDEEP

      3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:yOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks