General

  • Target

    2024-12-31_e25846b398ee51b878603d5b8fd8af11_mafia

  • Size

    12.8MB

  • Sample

    241231-w938aswkam

  • MD5

    e25846b398ee51b878603d5b8fd8af11

  • SHA1

    34d90d0997fe5507132e4c935801bc863e1adc4c

  • SHA256

    2f1b23eb1c673bd219f3a3ddcaae4fb4bccf8c66482089e103d21a875d240391

  • SHA512

    12a46f6dba8711bae6b4e350bcd8a8016131451664fab91c3faec66ade5a0c4e57f563dec34333f0ea29ce3104d011d67401af8861487fde4e9f8316c42b516c

  • SSDEEP

    3072:iLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:LOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-31_e25846b398ee51b878603d5b8fd8af11_mafia

    • Size

      12.8MB

    • MD5

      e25846b398ee51b878603d5b8fd8af11

    • SHA1

      34d90d0997fe5507132e4c935801bc863e1adc4c

    • SHA256

      2f1b23eb1c673bd219f3a3ddcaae4fb4bccf8c66482089e103d21a875d240391

    • SHA512

      12a46f6dba8711bae6b4e350bcd8a8016131451664fab91c3faec66ade5a0c4e57f563dec34333f0ea29ce3104d011d67401af8861487fde4e9f8316c42b516c

    • SSDEEP

      3072:iLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:LOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks