General

  • Target

    2025-01-21_67f32bf9c47840d904272b41465fe81a_mafia

  • Size

    10.2MB

  • Sample

    250121-111s2atpck

  • MD5

    67f32bf9c47840d904272b41465fe81a

  • SHA1

    ccd07693c4a9e4905824ab263abbcfa9c70d44fa

  • SHA256

    f6321d75861cf235291e85b0737a1dccca1dde649cfe674b48c65cfa6c45b96c

  • SHA512

    26bb5fde8bfeffdbb1a4e34b6d38320b9f034fc2dc15b39bbdcde7d79e9ad20cddbb7a62ec91d0a3bbd7bb6e0ea643115f59a89fe4717ac0a0a9ea340c7e6011

  • SSDEEP

    49152:4qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:4qtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-21_67f32bf9c47840d904272b41465fe81a_mafia

    • Size

      10.2MB

    • MD5

      67f32bf9c47840d904272b41465fe81a

    • SHA1

      ccd07693c4a9e4905824ab263abbcfa9c70d44fa

    • SHA256

      f6321d75861cf235291e85b0737a1dccca1dde649cfe674b48c65cfa6c45b96c

    • SHA512

      26bb5fde8bfeffdbb1a4e34b6d38320b9f034fc2dc15b39bbdcde7d79e9ad20cddbb7a62ec91d0a3bbd7bb6e0ea643115f59a89fe4717ac0a0a9ea340c7e6011

    • SSDEEP

      49152:4qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:4qtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks