General

  • Target

    2025-01-11_21b4465219a1a154003bb8b84360333d_mafia

  • Size

    13.2MB

  • Sample

    250111-t3n4pawmcq

  • MD5

    21b4465219a1a154003bb8b84360333d

  • SHA1

    444742300be0feace5aeedec675d3a551cfa4f6a

  • SHA256

    c1048cd43182a46e41b0839b55e03ba85b0945f974d5b9b1a606172f3d3bad5d

  • SHA512

    64615c3b1d61f18059b3b579d4320d427e912eba10a3d05992b5610135078707353bd3200f2c8f99f18e2b3d169c0d6235948456437d46541ecd34c11aba0c8c

  • SSDEEP

    24576:YpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttf:0oo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-11_21b4465219a1a154003bb8b84360333d_mafia

    • Size

      13.2MB

    • MD5

      21b4465219a1a154003bb8b84360333d

    • SHA1

      444742300be0feace5aeedec675d3a551cfa4f6a

    • SHA256

      c1048cd43182a46e41b0839b55e03ba85b0945f974d5b9b1a606172f3d3bad5d

    • SHA512

      64615c3b1d61f18059b3b579d4320d427e912eba10a3d05992b5610135078707353bd3200f2c8f99f18e2b3d169c0d6235948456437d46541ecd34c11aba0c8c

    • SSDEEP

      24576:YpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttf:0oo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks