General

  • Target

    2024-12-27_7822d4dadaa829018b0c167b74340e6e_mafia

  • Size

    14.6MB

  • Sample

    241227-y71qhazkbl

  • MD5

    7822d4dadaa829018b0c167b74340e6e

  • SHA1

    5f468af0c5575e32f87ef09a767f34ef7e3fd9eb

  • SHA256

    0c584226400c86c79c9afd05f6eee6d7c8e24b9fa2ac8c5c94c14bcda5caf4f4

  • SHA512

    499ad9ea86008198c2c809e5660d224bb20d6f70a6a7d8f0ba19c7b1141efe96a558b9326561e79c644da206444d87c9952fce0fb75125badd1ea3930ffa98a9

  • SSDEEP

    3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-27_7822d4dadaa829018b0c167b74340e6e_mafia

    • Size

      14.6MB

    • MD5

      7822d4dadaa829018b0c167b74340e6e

    • SHA1

      5f468af0c5575e32f87ef09a767f34ef7e3fd9eb

    • SHA256

      0c584226400c86c79c9afd05f6eee6d7c8e24b9fa2ac8c5c94c14bcda5caf4f4

    • SHA512

      499ad9ea86008198c2c809e5660d224bb20d6f70a6a7d8f0ba19c7b1141efe96a558b9326561e79c644da206444d87c9952fce0fb75125badd1ea3930ffa98a9

    • SSDEEP

      3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks