General

  • Target

    2025-01-09_cc640048a903f18aef9ea0fdfb9b3920_mafia

  • Size

    13.3MB

  • Sample

    250109-xltvdszmdp

  • MD5

    cc640048a903f18aef9ea0fdfb9b3920

  • SHA1

    cf2ffdbe0837aa34c6983027b7b2497d75a57d09

  • SHA256

    125121038f658715f0f002cd92bedf1bf318f8c211d64fa06d62e58d9c6d851e

  • SHA512

    e74d5fa348a8fa01a3a86e202e96aafcf65c51571e2be26ba011c2c3402b82dc18b54ec1a9524d2503c2a978d87e6bfa8f06f45a532e3de12d8656b4dfab5891

  • SSDEEP

    49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:9qtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-09_cc640048a903f18aef9ea0fdfb9b3920_mafia

    • Size

      13.3MB

    • MD5

      cc640048a903f18aef9ea0fdfb9b3920

    • SHA1

      cf2ffdbe0837aa34c6983027b7b2497d75a57d09

    • SHA256

      125121038f658715f0f002cd92bedf1bf318f8c211d64fa06d62e58d9c6d851e

    • SHA512

      e74d5fa348a8fa01a3a86e202e96aafcf65c51571e2be26ba011c2c3402b82dc18b54ec1a9524d2503c2a978d87e6bfa8f06f45a532e3de12d8656b4dfab5891

    • SSDEEP

      49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:9qtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks