General

  • Target

    2024-12-29_e83049b18c14959ed27446ef0efceba5_mafia

  • Size

    11.7MB

  • Sample

    241229-y89d2axjbn

  • MD5

    e83049b18c14959ed27446ef0efceba5

  • SHA1

    283041dc1182663450547935b60ec42709412eda

  • SHA256

    0ce4c0093fe649941ca157dd892d42b0509692bf95956ada81094b17922d30cf

  • SHA512

    c7b8775c66e9bbf9bb0c8e0bb13cd8ffefa49e1649f50714fae6f835bd2a5b0ae3652d430a952625428e6b620371bb99be04319e7f10b1cd840db50be20caaf6

  • SSDEEP

    3072:fLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:WOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-29_e83049b18c14959ed27446ef0efceba5_mafia

    • Size

      11.7MB

    • MD5

      e83049b18c14959ed27446ef0efceba5

    • SHA1

      283041dc1182663450547935b60ec42709412eda

    • SHA256

      0ce4c0093fe649941ca157dd892d42b0509692bf95956ada81094b17922d30cf

    • SHA512

      c7b8775c66e9bbf9bb0c8e0bb13cd8ffefa49e1649f50714fae6f835bd2a5b0ae3652d430a952625428e6b620371bb99be04319e7f10b1cd840db50be20caaf6

    • SSDEEP

      3072:fLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:WOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks