General

  • Target

    2024-12-22_b82fd7f8c53a08352f6a9b9334e91beb_mafia

  • Size

    14.8MB

  • Sample

    241222-ys5e5sxqfl

  • MD5

    b82fd7f8c53a08352f6a9b9334e91beb

  • SHA1

    1706f756e43a88d305fa8ef491e5d71b8505c3cc

  • SHA256

    d7fe9f760dfce3b7a6b53e5159d3b7af53cf7c1041af9bbb9f1e335d9946d74e

  • SHA512

    3e0abd797ac7aaef9861a7ff397d1370956fafc51839bc98aaea524d4c9853d13e91119ee24ce2eb9b6a99d2b476defa1a0995bd655b3468a20aab713604002d

  • SSDEEP

    3072:wLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:NOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-22_b82fd7f8c53a08352f6a9b9334e91beb_mafia

    • Size

      14.8MB

    • MD5

      b82fd7f8c53a08352f6a9b9334e91beb

    • SHA1

      1706f756e43a88d305fa8ef491e5d71b8505c3cc

    • SHA256

      d7fe9f760dfce3b7a6b53e5159d3b7af53cf7c1041af9bbb9f1e335d9946d74e

    • SHA512

      3e0abd797ac7aaef9861a7ff397d1370956fafc51839bc98aaea524d4c9853d13e91119ee24ce2eb9b6a99d2b476defa1a0995bd655b3468a20aab713604002d

    • SSDEEP

      3072:wLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:NOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks