General

  • Target

    2025-01-21_6a397c7bc04ae63117f5925e9b9fd54f_mafia

  • Size

    12.9MB

  • Sample

    250121-15dt3atlet

  • MD5

    6a397c7bc04ae63117f5925e9b9fd54f

  • SHA1

    940657256af629fa51b70bc05779ef0976c63637

  • SHA256

    23be3499b2b9a7e01237488f80243a36b9be5d528a0ec85a717cd4b0104ddbe8

  • SHA512

    4dfb4f3e74ed91757bed613051d5cca3ed2b844e0eb72aa074d8540c01711d18e6707c93d5245f0bc685a2f6b5c3f5af1b75b0df38298f79b3e39312260eac83

  • SSDEEP

    24576:WEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:Pfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-21_6a397c7bc04ae63117f5925e9b9fd54f_mafia

    • Size

      12.9MB

    • MD5

      6a397c7bc04ae63117f5925e9b9fd54f

    • SHA1

      940657256af629fa51b70bc05779ef0976c63637

    • SHA256

      23be3499b2b9a7e01237488f80243a36b9be5d528a0ec85a717cd4b0104ddbe8

    • SHA512

      4dfb4f3e74ed91757bed613051d5cca3ed2b844e0eb72aa074d8540c01711d18e6707c93d5245f0bc685a2f6b5c3f5af1b75b0df38298f79b3e39312260eac83

    • SSDEEP

      24576:WEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:Pfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks