General

  • Target

    2024-12-26_db987c25ac0b684de3ed6bbec118360d_mafia

  • Size

    12.4MB

  • Sample

    241226-zhmm1szjal

  • MD5

    db987c25ac0b684de3ed6bbec118360d

  • SHA1

    341aa3b8893a3661ac0d6ca3f5feca34d01306ba

  • SHA256

    9bf94e55f10d23d60a724a00c10f8782c10827846bc1e7315717c75b06439fc4

  • SHA512

    8d2627d560e5dc07d5e0d2756958b1405528a068d4c82bcaf8e45dc0bdf2b812c18e019de8239096955f44138542bf89085aea507427b2002f0cca281fe34730

  • SSDEEP

    3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-26_db987c25ac0b684de3ed6bbec118360d_mafia

    • Size

      12.4MB

    • MD5

      db987c25ac0b684de3ed6bbec118360d

    • SHA1

      341aa3b8893a3661ac0d6ca3f5feca34d01306ba

    • SHA256

      9bf94e55f10d23d60a724a00c10f8782c10827846bc1e7315717c75b06439fc4

    • SHA512

      8d2627d560e5dc07d5e0d2756958b1405528a068d4c82bcaf8e45dc0bdf2b812c18e019de8239096955f44138542bf89085aea507427b2002f0cca281fe34730

    • SSDEEP

      3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks