General
-
Target
2025-01-15_bcf405aa2a91aae311e9a0d51a2014ac_mafia
-
Size
10.9MB
-
Sample
250115-bltnqswjcy
-
MD5
bcf405aa2a91aae311e9a0d51a2014ac
-
SHA1
bb5db982955a4a866d638c2787a2f54e50a9c59e
-
SHA256
c51d1bc621dc0db87e6aaaf6b6a51cd1a941ed42b932031d7fad7c0ceea5f8d9
-
SHA512
39a17d671c980468789c7b87e242f580e593adc1e380bd328338f00ac43178ba58c54eb3b192019a0d840ed83440aa787a621a90218613f159fe4e2204356c81
-
SSDEEP
49152:dLFuiE888888888888888888888888888888888888888888888888888888888E:dLM
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-15_bcf405aa2a91aae311e9a0d51a2014ac_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-15_bcf405aa2a91aae311e9a0d51a2014ac_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-01-15_bcf405aa2a91aae311e9a0d51a2014ac_mafia
-
Size
10.9MB
-
MD5
bcf405aa2a91aae311e9a0d51a2014ac
-
SHA1
bb5db982955a4a866d638c2787a2f54e50a9c59e
-
SHA256
c51d1bc621dc0db87e6aaaf6b6a51cd1a941ed42b932031d7fad7c0ceea5f8d9
-
SHA512
39a17d671c980468789c7b87e242f580e593adc1e380bd328338f00ac43178ba58c54eb3b192019a0d840ed83440aa787a621a90218613f159fe4e2204356c81
-
SSDEEP
49152:dLFuiE888888888888888888888888888888888888888888888888888888888E:dLM
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2