General

  • Target

    2025-01-18_faad12ce0d384a4195103d02f56bc1d4_mafia

  • Size

    13.3MB

  • Sample

    250118-ymg3naslg1

  • MD5

    faad12ce0d384a4195103d02f56bc1d4

  • SHA1

    f42d78031526b2a2cbfa02a9090bb6ffde99f7d3

  • SHA256

    0398bddc85d479504d1353e2d665cb53b9470233be52ada7e5ba6c20a5f40bc1

  • SHA512

    07d71c5aa9a71f47258127e983724333eece34906fc590337ea2fe5dd761d2d605e4c533d5cea72eb26e601ed4c0066c399d078af8d5123bef3e45455353ff7b

  • SSDEEP

    24576:o6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ:1WdLQk

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-18_faad12ce0d384a4195103d02f56bc1d4_mafia

    • Size

      13.3MB

    • MD5

      faad12ce0d384a4195103d02f56bc1d4

    • SHA1

      f42d78031526b2a2cbfa02a9090bb6ffde99f7d3

    • SHA256

      0398bddc85d479504d1353e2d665cb53b9470233be52ada7e5ba6c20a5f40bc1

    • SHA512

      07d71c5aa9a71f47258127e983724333eece34906fc590337ea2fe5dd761d2d605e4c533d5cea72eb26e601ed4c0066c399d078af8d5123bef3e45455353ff7b

    • SSDEEP

      24576:o6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ:1WdLQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks