General

  • Target

    2025-01-13_b26be96277efa679e8a1fe0e211681d7_mafia

  • Size

    14.4MB

  • Sample

    250113-yhrrasvrhv

  • MD5

    b26be96277efa679e8a1fe0e211681d7

  • SHA1

    5dbe836df94801b9ffaaa4936961a72bf1906259

  • SHA256

    65e7dca3e554fa97db7b5c161d2b3b712a32563dc67f02ab98ea8c6179c11932

  • SHA512

    4555510ec6c7fdd4836afdee3687bf52f2105218c18dfc9304608ff5878cb254da62e6aa989d5889822d848e045fe4c555fca920addc2c7478249f67b21dbad0

  • SSDEEP

    6144:lLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQo:WTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-13_b26be96277efa679e8a1fe0e211681d7_mafia

    • Size

      14.4MB

    • MD5

      b26be96277efa679e8a1fe0e211681d7

    • SHA1

      5dbe836df94801b9ffaaa4936961a72bf1906259

    • SHA256

      65e7dca3e554fa97db7b5c161d2b3b712a32563dc67f02ab98ea8c6179c11932

    • SHA512

      4555510ec6c7fdd4836afdee3687bf52f2105218c18dfc9304608ff5878cb254da62e6aa989d5889822d848e045fe4c555fca920addc2c7478249f67b21dbad0

    • SSDEEP

      6144:lLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQo:WTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks