General
-
Target
2025-01-19_5902771d2cea8460388d23fbcac64799_mafia
-
Size
13.5MB
-
Sample
250119-yqkmystje1
-
MD5
5902771d2cea8460388d23fbcac64799
-
SHA1
22a47f9a53b3e1cb5670eb06416b4b8523bc50bd
-
SHA256
21357848492562600821029f2e52e3b4670465097d6de080758a323b5014df7a
-
SHA512
78a222f3f26577b74aa012869d9717f14d54ab7575816d7e385eed525091f0f828bc66d01028b79812a95e421f7994ee51feebcb268ff5eb7ba2cb6bca082c4e
-
SSDEEP
24576:bpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt/:too
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-19_5902771d2cea8460388d23fbcac64799_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-19_5902771d2cea8460388d23fbcac64799_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-01-19_5902771d2cea8460388d23fbcac64799_mafia
-
Size
13.5MB
-
MD5
5902771d2cea8460388d23fbcac64799
-
SHA1
22a47f9a53b3e1cb5670eb06416b4b8523bc50bd
-
SHA256
21357848492562600821029f2e52e3b4670465097d6de080758a323b5014df7a
-
SHA512
78a222f3f26577b74aa012869d9717f14d54ab7575816d7e385eed525091f0f828bc66d01028b79812a95e421f7994ee51feebcb268ff5eb7ba2cb6bca082c4e
-
SSDEEP
24576:bpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt/:too
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2