General

  • Target

    2025-01-13_e90cd7091a0e5827b979fa8024529000_mafia

  • Size

    12.1MB

  • Sample

    250113-yp1b1swlf1

  • MD5

    e90cd7091a0e5827b979fa8024529000

  • SHA1

    9379994ffb40d7baf0195ba19d247524c6a8bb72

  • SHA256

    783769984f55579b42bb8c8ef0eb5583f366714cdd259d693ed7ce8a1f34898b

  • SHA512

    61dec5935ff2b9d1442fda08920ad2c319d92b173a35ca1af0feaf38e8e927fc6a4906ff16b180b003dd46920fe873b2be9d0dead9523c23664514b4d76116fc

  • SSDEEP

    49152:iqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:iqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-13_e90cd7091a0e5827b979fa8024529000_mafia

    • Size

      12.1MB

    • MD5

      e90cd7091a0e5827b979fa8024529000

    • SHA1

      9379994ffb40d7baf0195ba19d247524c6a8bb72

    • SHA256

      783769984f55579b42bb8c8ef0eb5583f366714cdd259d693ed7ce8a1f34898b

    • SHA512

      61dec5935ff2b9d1442fda08920ad2c319d92b173a35ca1af0feaf38e8e927fc6a4906ff16b180b003dd46920fe873b2be9d0dead9523c23664514b4d76116fc

    • SSDEEP

      49152:iqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:iqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks