General

  • Target

    2025-01-19_c63778e93f7529031491210a143a3b73_mafia

  • Size

    12.7MB

  • Sample

    250119-vpr4vsxqfl

  • MD5

    c63778e93f7529031491210a143a3b73

  • SHA1

    11c1b76f3ef22cbaa76e0a416a1f2fdc6564f186

  • SHA256

    f41e84a74a46234e7e8864813e0325151e78cef7155e84490519cc2d5adca8b1

  • SHA512

    7118c24c6d35a2061e7f20dfeead6689dca67405abd8634f56427232b322a380c06d7864f12c6e68957bb0c4db092c0cbdf052402ecf6535cc74fe41ecb39240

  • SSDEEP

    49152:8qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:8qtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-19_c63778e93f7529031491210a143a3b73_mafia

    • Size

      12.7MB

    • MD5

      c63778e93f7529031491210a143a3b73

    • SHA1

      11c1b76f3ef22cbaa76e0a416a1f2fdc6564f186

    • SHA256

      f41e84a74a46234e7e8864813e0325151e78cef7155e84490519cc2d5adca8b1

    • SHA512

      7118c24c6d35a2061e7f20dfeead6689dca67405abd8634f56427232b322a380c06d7864f12c6e68957bb0c4db092c0cbdf052402ecf6535cc74fe41ecb39240

    • SSDEEP

      49152:8qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:8qtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks