General

  • Target

    2024-12-31_041bff40cf772c28086f2136218489f2_mafia

  • Size

    11.3MB

  • Sample

    241231-xgb4satmgt

  • MD5

    041bff40cf772c28086f2136218489f2

  • SHA1

    a933c80b433a90b7985599f6d7b4a498cf2c75d7

  • SHA256

    b0bdf6212ea9483d04f5ad47a0d4af05f379eeddbee38b13627ad921af336bf3

  • SHA512

    77c8cf466a70b5ff5545d2fe997b48c84f090f3e63c48ed9df087c5bbf76d00f2132a3173fd792caee7c12621adafd08fddb72631d11025edcc2204d15cf39c5

  • SSDEEP

    3072:RLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:UOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2024-12-31_041bff40cf772c28086f2136218489f2_mafia

    • Size

      11.3MB

    • MD5

      041bff40cf772c28086f2136218489f2

    • SHA1

      a933c80b433a90b7985599f6d7b4a498cf2c75d7

    • SHA256

      b0bdf6212ea9483d04f5ad47a0d4af05f379eeddbee38b13627ad921af336bf3

    • SHA512

      77c8cf466a70b5ff5545d2fe997b48c84f090f3e63c48ed9df087c5bbf76d00f2132a3173fd792caee7c12621adafd08fddb72631d11025edcc2204d15cf39c5

    • SSDEEP

      3072:RLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:UOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks