General
-
Target
2025-01-15_b5745a86aa14cdcecc7ff3c6249aa5a9_mafia
-
Size
10.9MB
-
Sample
250115-xl2v1a1pfx
-
MD5
b5745a86aa14cdcecc7ff3c6249aa5a9
-
SHA1
3db2edc1501ad7c74a887aa05b42db80ca69d3fb
-
SHA256
14cc73a250ed6baf6a54c20f5e3b16b9873e33ffa3d034dd493ed9076fa133e3
-
SHA512
9b2637111e11ced1a39b5835e98103f897ac49784e293ca298d2741eae04c62fb4a38d0124a4e8e5e370a0468f1b323dff47af2b59775944d11df7b11548f0f0
-
SSDEEP
24576:SpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttl:2oo
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-15_b5745a86aa14cdcecc7ff3c6249aa5a9_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-15_b5745a86aa14cdcecc7ff3c6249aa5a9_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-01-15_b5745a86aa14cdcecc7ff3c6249aa5a9_mafia
-
Size
10.9MB
-
MD5
b5745a86aa14cdcecc7ff3c6249aa5a9
-
SHA1
3db2edc1501ad7c74a887aa05b42db80ca69d3fb
-
SHA256
14cc73a250ed6baf6a54c20f5e3b16b9873e33ffa3d034dd493ed9076fa133e3
-
SHA512
9b2637111e11ced1a39b5835e98103f897ac49784e293ca298d2741eae04c62fb4a38d0124a4e8e5e370a0468f1b323dff47af2b59775944d11df7b11548f0f0
-
SSDEEP
24576:SpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttl:2oo
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2