General

  • Target

    2025-01-13_f7e37203241990cb2daf5a06e0ac5b9c_mafia

  • Size

    10.7MB

  • Sample

    250113-y5zenawqcz

  • MD5

    f7e37203241990cb2daf5a06e0ac5b9c

  • SHA1

    5887dc7c0997f274dc130d29a1fbdff2191a958c

  • SHA256

    d322561afeb8e4953a33970d44b4d6df00479d61c6b8eed3cb6be8a7e7ef57e3

  • SHA512

    cc3d27268fbc85c1af01023f3e5071bd01c40235006af28f2eca524108d2099a8195726c820f9facfcf1d562d760a866917e1b53f9a3924bfb0555e6c5b716b4

  • SSDEEP

    6144:fLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQQ:ETYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-13_f7e37203241990cb2daf5a06e0ac5b9c_mafia

    • Size

      10.7MB

    • MD5

      f7e37203241990cb2daf5a06e0ac5b9c

    • SHA1

      5887dc7c0997f274dc130d29a1fbdff2191a958c

    • SHA256

      d322561afeb8e4953a33970d44b4d6df00479d61c6b8eed3cb6be8a7e7ef57e3

    • SHA512

      cc3d27268fbc85c1af01023f3e5071bd01c40235006af28f2eca524108d2099a8195726c820f9facfcf1d562d760a866917e1b53f9a3924bfb0555e6c5b716b4

    • SSDEEP

      6144:fLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQQ:ETYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks