General

  • Target

    2024-12-31_f899d269684cca932eec89a41dff0fc4_mafia

  • Size

    12.6MB

  • Sample

    241231-xb87bstkh1

  • MD5

    f899d269684cca932eec89a41dff0fc4

  • SHA1

    350be1aceab663b364488aca77608767dd863fa1

  • SHA256

    318a029855a3cb946c8a3ca63c1c932a0e3885b2bec4a87de261860ddd165db4

  • SHA512

    12c09ffa6e58ce985fb69f9983b0c656ee4c90376f5c5b96ff8f91840f95b35ed2f18e681083aabe7d0758442f3ecf27bcfb8f8a5d87bfc48aabb9e735eb489d

  • SSDEEP

    3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-31_f899d269684cca932eec89a41dff0fc4_mafia

    • Size

      12.6MB

    • MD5

      f899d269684cca932eec89a41dff0fc4

    • SHA1

      350be1aceab663b364488aca77608767dd863fa1

    • SHA256

      318a029855a3cb946c8a3ca63c1c932a0e3885b2bec4a87de261860ddd165db4

    • SHA512

      12c09ffa6e58ce985fb69f9983b0c656ee4c90376f5c5b96ff8f91840f95b35ed2f18e681083aabe7d0758442f3ecf27bcfb8f8a5d87bfc48aabb9e735eb489d

    • SSDEEP

      3072:uLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:3OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks