General

  • Target

    2025-01-11_2d4066cc99d8ca925b825c0991dad4a8_mafia

  • Size

    13.7MB

  • Sample

    250111-wjv41axpbl

  • MD5

    2d4066cc99d8ca925b825c0991dad4a8

  • SHA1

    646df71080b521a8738bc52143f68107e4ec1851

  • SHA256

    f80152d12c33926f680f4e07bb29987471b83ae920bed66f3be5a831658ca711

  • SHA512

    4bf737ce67f34e0864c746f36051ccac4c7ae76b6bfb8c1fb639755f6c2f277f6992c44fa7e4190fdb7d92b319e4e53a07ae9f88af215bf66bc66f913507ea34

  • SSDEEP

    6144:oLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQo:9TYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-11_2d4066cc99d8ca925b825c0991dad4a8_mafia

    • Size

      13.7MB

    • MD5

      2d4066cc99d8ca925b825c0991dad4a8

    • SHA1

      646df71080b521a8738bc52143f68107e4ec1851

    • SHA256

      f80152d12c33926f680f4e07bb29987471b83ae920bed66f3be5a831658ca711

    • SHA512

      4bf737ce67f34e0864c746f36051ccac4c7ae76b6bfb8c1fb639755f6c2f277f6992c44fa7e4190fdb7d92b319e4e53a07ae9f88af215bf66bc66f913507ea34

    • SSDEEP

      6144:oLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQo:9TYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks