General

  • Target

    2025-01-15_a9bfc087d28bfb8f6c26ffc5f5964c02_mafia

  • Size

    14.7MB

  • Sample

    250115-xhg2es1ndw

  • MD5

    a9bfc087d28bfb8f6c26ffc5f5964c02

  • SHA1

    0572d7495a43429fed412d54be02aabcf2789e36

  • SHA256

    021bd6224b01e129bc698c169147d0cdc9837da61d7b5dad9b95a261c08aa1e0

  • SHA512

    49e8ec0f5c372071a150b3545ba09197ee141c3a7b11562dd7ede8053edda5b600fac01c9dd07911bb2ab90a5c566ffbf608a9b720f155e44217ab65e54e2196

  • SSDEEP

    393216:lXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-15_a9bfc087d28bfb8f6c26ffc5f5964c02_mafia

    • Size

      14.7MB

    • MD5

      a9bfc087d28bfb8f6c26ffc5f5964c02

    • SHA1

      0572d7495a43429fed412d54be02aabcf2789e36

    • SHA256

      021bd6224b01e129bc698c169147d0cdc9837da61d7b5dad9b95a261c08aa1e0

    • SHA512

      49e8ec0f5c372071a150b3545ba09197ee141c3a7b11562dd7ede8053edda5b600fac01c9dd07911bb2ab90a5c566ffbf608a9b720f155e44217ab65e54e2196

    • SSDEEP

      393216:lXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks