General

  • Target

    2024-12-27_bf0482b484090d1a7804ebb245a98bb1_mafia

  • Size

    12.1MB

  • Sample

    241227-zd1dbazjax

  • MD5

    bf0482b484090d1a7804ebb245a98bb1

  • SHA1

    9bde15de16971320eb45314538f3916547f85e4c

  • SHA256

    7361cc6e57468a8f812fb6174a3ca3081d136942c82a2cf6250e8eabdb9b0aee

  • SHA512

    cd6d9cf4d3a89a93f1274b2e85ce54f396c6aa3b573c93b8b30cbac6e229915b39c714d14befbf1e91a93abbac9aeec8cf589972665e1d32c60cea1da9c5b310

  • SSDEEP

    3072:/LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:2OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-27_bf0482b484090d1a7804ebb245a98bb1_mafia

    • Size

      12.1MB

    • MD5

      bf0482b484090d1a7804ebb245a98bb1

    • SHA1

      9bde15de16971320eb45314538f3916547f85e4c

    • SHA256

      7361cc6e57468a8f812fb6174a3ca3081d136942c82a2cf6250e8eabdb9b0aee

    • SHA512

      cd6d9cf4d3a89a93f1274b2e85ce54f396c6aa3b573c93b8b30cbac6e229915b39c714d14befbf1e91a93abbac9aeec8cf589972665e1d32c60cea1da9c5b310

    • SSDEEP

      3072:/LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:2OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks