General

  • Target

    2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia

  • Size

    12.7MB

  • Sample

    250113-x5zvravlas

  • MD5

    8f99b8d69deb167959d1393683ef98cf

  • SHA1

    6de38f45f39789d19b16585de4253305bd7fe37f

  • SHA256

    ed3d51d8d09ff9f79b03d40fb912639f24094280abbf068d861780b5a440545e

  • SHA512

    dbbe11ee848813339c5f3652d934f33348277e43ad5f5e0bcfb0cf9091a163999b40f140a1b49629ba936cf979f4ed42299931eaf440ac780e4f0ade70f05e1b

  • SSDEEP

    24576:UpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt3:goo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-13_8f99b8d69deb167959d1393683ef98cf_mafia

    • Size

      12.7MB

    • MD5

      8f99b8d69deb167959d1393683ef98cf

    • SHA1

      6de38f45f39789d19b16585de4253305bd7fe37f

    • SHA256

      ed3d51d8d09ff9f79b03d40fb912639f24094280abbf068d861780b5a440545e

    • SHA512

      dbbe11ee848813339c5f3652d934f33348277e43ad5f5e0bcfb0cf9091a163999b40f140a1b49629ba936cf979f4ed42299931eaf440ac780e4f0ade70f05e1b

    • SSDEEP

      24576:UpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt3:goo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks