General

  • Target

    2025-01-18_f3d769498f02e8f68fb85444b4893068_mafia

  • Size

    10.2MB

  • Sample

    250118-zhv96avlfq

  • MD5

    f3d769498f02e8f68fb85444b4893068

  • SHA1

    39bc846e09c574a21dc5809a3a78a6232f1ef96d

  • SHA256

    d17c61ddf9e340d1c5f213aa1fa64950b786036e143c2d098020c16a49d5d12f

  • SHA512

    43fe0ec173e671bdf992f56775b4c39988a26c76dd7f545f87b4567212437a1cbdf306800bb585626dd319c7bc6ef38e3e7a900480796f0b95284c3031a0eb9f

  • SSDEEP

    24576:xEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZx:Kfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-18_f3d769498f02e8f68fb85444b4893068_mafia

    • Size

      10.2MB

    • MD5

      f3d769498f02e8f68fb85444b4893068

    • SHA1

      39bc846e09c574a21dc5809a3a78a6232f1ef96d

    • SHA256

      d17c61ddf9e340d1c5f213aa1fa64950b786036e143c2d098020c16a49d5d12f

    • SHA512

      43fe0ec173e671bdf992f56775b4c39988a26c76dd7f545f87b4567212437a1cbdf306800bb585626dd319c7bc6ef38e3e7a900480796f0b95284c3031a0eb9f

    • SSDEEP

      24576:xEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZx:Kfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks