General

  • Target

    2025-01-13_427b1115c6bc283e5e04556c14c8d048_mafia

  • Size

    13.1MB

  • Sample

    250113-yjyk8sxraq

  • MD5

    427b1115c6bc283e5e04556c14c8d048

  • SHA1

    b7beb79f1566f865c36f1f37d5a8ccc4cebb2f5c

  • SHA256

    ef14a8e34bd2368ffdd772548caef37f4b13907482f667e6097c960084e07354

  • SHA512

    35e15b7a334f47b64bfed5e05a72e9198b5630e2a2ce1c903b0563da599bc4e863658092b5673e64b1b011a1d7eb14660b9db5048d2a591b9720670babc7b451

  • SSDEEP

    3072:XLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:uOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-13_427b1115c6bc283e5e04556c14c8d048_mafia

    • Size

      13.1MB

    • MD5

      427b1115c6bc283e5e04556c14c8d048

    • SHA1

      b7beb79f1566f865c36f1f37d5a8ccc4cebb2f5c

    • SHA256

      ef14a8e34bd2368ffdd772548caef37f4b13907482f667e6097c960084e07354

    • SHA512

      35e15b7a334f47b64bfed5e05a72e9198b5630e2a2ce1c903b0563da599bc4e863658092b5673e64b1b011a1d7eb14660b9db5048d2a591b9720670babc7b451

    • SSDEEP

      3072:XLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:uOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks