General

  • Target

    2025-01-18_991f4a42ff851f8b3363db9251d39ea2_mafia

  • Size

    11.8MB

  • Sample

    250118-y7xnvatrej

  • MD5

    991f4a42ff851f8b3363db9251d39ea2

  • SHA1

    cfc4f31a7e136b93081c4ce0c7eb013e3b56a8b7

  • SHA256

    9965d42357361bba917eeeaaefc632514b424626b965ea69d8c2523c70de681b

  • SHA512

    87d7c5cc0a3897674950a0c0ded324cf8b61cff5ecb1419e295f8081c7e660e8a82832ae0e30ceaf1a9b11630e1b706697291c1c9f63d3b1200147934b118585

  • SSDEEP

    49152:lqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:lqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-18_991f4a42ff851f8b3363db9251d39ea2_mafia

    • Size

      11.8MB

    • MD5

      991f4a42ff851f8b3363db9251d39ea2

    • SHA1

      cfc4f31a7e136b93081c4ce0c7eb013e3b56a8b7

    • SHA256

      9965d42357361bba917eeeaaefc632514b424626b965ea69d8c2523c70de681b

    • SHA512

      87d7c5cc0a3897674950a0c0ded324cf8b61cff5ecb1419e295f8081c7e660e8a82832ae0e30ceaf1a9b11630e1b706697291c1c9f63d3b1200147934b118585

    • SSDEEP

      49152:lqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:lqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks