General

  • Target

    2025-01-15_d7ef9529421e324f01552cb999958522_mafia

  • Size

    12.2MB

  • Sample

    250115-xs9t7a1re1

  • MD5

    d7ef9529421e324f01552cb999958522

  • SHA1

    6032398c9246014af54aa6ec4fd6980ff89f2f9d

  • SHA256

    f887cefae06387746672a7f3e3ebf7ea7bc137f6af488eb9eb4438f7ebc5f28a

  • SHA512

    0f110168c1c01e8df0d68e744f2327db173b18f03909c282bf7d8b374bb005275b568db91aeb5070941767762c2fb06e79c66cb62c039cfae0d8601b3e6d6fa4

  • SSDEEP

    6144:TLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:oTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-15_d7ef9529421e324f01552cb999958522_mafia

    • Size

      12.2MB

    • MD5

      d7ef9529421e324f01552cb999958522

    • SHA1

      6032398c9246014af54aa6ec4fd6980ff89f2f9d

    • SHA256

      f887cefae06387746672a7f3e3ebf7ea7bc137f6af488eb9eb4438f7ebc5f28a

    • SHA512

      0f110168c1c01e8df0d68e744f2327db173b18f03909c282bf7d8b374bb005275b568db91aeb5070941767762c2fb06e79c66cb62c039cfae0d8601b3e6d6fa4

    • SSDEEP

      6144:TLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:oTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks