General

  • Target

    2025-01-19_6937aad9b667b4ba21f4d2d219ea3641_mafia

  • Size

    13.2MB

  • Sample

    250119-ywh2batrcm

  • MD5

    6937aad9b667b4ba21f4d2d219ea3641

  • SHA1

    5248524013ad78970facb6b83e769a78a8433ead

  • SHA256

    120f21f223ace3fae0054b1e17a5416602f1c2d16e2a774d4746be56d3120a28

  • SHA512

    9a94aee744357a2452465639e6d0ca7a6e94805f403169fa13bb799c6e72a6c0c1745b512e711de493dc0c10a1603902991ad7919ded3927da294e4560e24fac

  • SSDEEP

    393216:vXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-19_6937aad9b667b4ba21f4d2d219ea3641_mafia

    • Size

      13.2MB

    • MD5

      6937aad9b667b4ba21f4d2d219ea3641

    • SHA1

      5248524013ad78970facb6b83e769a78a8433ead

    • SHA256

      120f21f223ace3fae0054b1e17a5416602f1c2d16e2a774d4746be56d3120a28

    • SHA512

      9a94aee744357a2452465639e6d0ca7a6e94805f403169fa13bb799c6e72a6c0c1745b512e711de493dc0c10a1603902991ad7919ded3927da294e4560e24fac

    • SSDEEP

      393216:vXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks