General

  • Target

    2025-01-15_3233786abe3f10c3b3c7248873abf10a_mafia

  • Size

    10.7MB

  • Sample

    250115-xhfhla1ndt

  • MD5

    3233786abe3f10c3b3c7248873abf10a

  • SHA1

    6ed54a117d5f9a237d4d15b5db518dbcaf2ae63a

  • SHA256

    eed0b339509bc0a1ba496841e9148ce2b01100f39cf4c08568714156d7072e6a

  • SHA512

    2b06f09f9a04f1e9e0b8c155772f709297bb83785d052029fa090546857e3265c0dd9e790f6523d3feea5ee5cdef2de62096e54c3ebce02b086315c19e7f76c7

  • SSDEEP

    24576:+pomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttl:Soo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-15_3233786abe3f10c3b3c7248873abf10a_mafia

    • Size

      10.7MB

    • MD5

      3233786abe3f10c3b3c7248873abf10a

    • SHA1

      6ed54a117d5f9a237d4d15b5db518dbcaf2ae63a

    • SHA256

      eed0b339509bc0a1ba496841e9148ce2b01100f39cf4c08568714156d7072e6a

    • SHA512

      2b06f09f9a04f1e9e0b8c155772f709297bb83785d052029fa090546857e3265c0dd9e790f6523d3feea5ee5cdef2de62096e54c3ebce02b086315c19e7f76c7

    • SSDEEP

      24576:+pomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttl:Soo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks