General

  • Target

    2025-01-11_b88efd6fd62027047f6503b844b1254b_mafia

  • Size

    12.0MB

  • Sample

    250111-w38t7swjdv

  • MD5

    b88efd6fd62027047f6503b844b1254b

  • SHA1

    4517af79b45370fbebbe0c232c60a492b6522a21

  • SHA256

    9225795b892568f50097ba1ea2c0cf9872aa3f8c65dc1ad1f4c5a709ae11156f

  • SHA512

    3314dbc99d7f90926f2e2b878bdf32986833f888ae6f58de2e6452592b20f44de0a82a2bcf20daf848257a3da2bb764e570ed10f9791dc546af3b628e9ff1ef4

  • SSDEEP

    24576:OEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZd:nfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-11_b88efd6fd62027047f6503b844b1254b_mafia

    • Size

      12.0MB

    • MD5

      b88efd6fd62027047f6503b844b1254b

    • SHA1

      4517af79b45370fbebbe0c232c60a492b6522a21

    • SHA256

      9225795b892568f50097ba1ea2c0cf9872aa3f8c65dc1ad1f4c5a709ae11156f

    • SHA512

      3314dbc99d7f90926f2e2b878bdf32986833f888ae6f58de2e6452592b20f44de0a82a2bcf20daf848257a3da2bb764e570ed10f9791dc546af3b628e9ff1ef4

    • SSDEEP

      24576:OEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZd:nfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks