General
-
Target
2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia
-
Size
12.7MB
-
Sample
250113-x5zvravlas
-
MD5
8f99b8d69deb167959d1393683ef98cf
-
SHA1
6de38f45f39789d19b16585de4253305bd7fe37f
-
SHA256
ed3d51d8d09ff9f79b03d40fb912639f24094280abbf068d861780b5a440545e
-
SHA512
dbbe11ee848813339c5f3652d934f33348277e43ad5f5e0bcfb0cf9091a163999b40f140a1b49629ba936cf979f4ed42299931eaf440ac780e4f0ade70f05e1b
-
SSDEEP
24576:UpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt3:goo
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia
-
Size
12.7MB
-
MD5
8f99b8d69deb167959d1393683ef98cf
-
SHA1
6de38f45f39789d19b16585de4253305bd7fe37f
-
SHA256
ed3d51d8d09ff9f79b03d40fb912639f24094280abbf068d861780b5a440545e
-
SHA512
dbbe11ee848813339c5f3652d934f33348277e43ad5f5e0bcfb0cf9091a163999b40f140a1b49629ba936cf979f4ed42299931eaf440ac780e4f0ade70f05e1b
-
SSDEEP
24576:UpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt3:goo
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2