General

  • Target

    2025-01-18_d6c6995eda7d5ae7cc5a7be0bb7eba8d_mafia

  • Size

    14.7MB

  • Sample

    250118-ze2b1atmcx

  • MD5

    d6c6995eda7d5ae7cc5a7be0bb7eba8d

  • SHA1

    1b27e433065b4364f360759dbacf351072b7bbe7

  • SHA256

    cdb4d297bc53dcf661f9f58812fd44e494a64760a4dea483f8f89bee9791e2a4

  • SHA512

    e8db003a63ab17dc3b4c566027e69899b00f4bd981905b5c9e642df9e79b3fc2c24bd3ed239af27a5f9920a9a9f70e31a4463c9884a03db0ad08380b14472738

  • SSDEEP

    49152:wqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:wqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-18_d6c6995eda7d5ae7cc5a7be0bb7eba8d_mafia

    • Size

      14.7MB

    • MD5

      d6c6995eda7d5ae7cc5a7be0bb7eba8d

    • SHA1

      1b27e433065b4364f360759dbacf351072b7bbe7

    • SHA256

      cdb4d297bc53dcf661f9f58812fd44e494a64760a4dea483f8f89bee9791e2a4

    • SHA512

      e8db003a63ab17dc3b4c566027e69899b00f4bd981905b5c9e642df9e79b3fc2c24bd3ed239af27a5f9920a9a9f70e31a4463c9884a03db0ad08380b14472738

    • SSDEEP

      49152:wqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:wqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks