General

  • Target

    2025-01-21_c8478f4f5d94b9ac131ff2d84e5d3909_mafia

  • Size

    11.1MB

  • Sample

    250121-282kzawqcj

  • MD5

    c8478f4f5d94b9ac131ff2d84e5d3909

  • SHA1

    4b7ca3f00711ea4a9c8b5aeef648044fc7e85255

  • SHA256

    8aeb2c30634da05e2c33aec859f61d05a3b0f69d41e76562fe37cc784fc1566c

  • SHA512

    a63d72342ad22ceba03c11a4ffe3e08c37bd9fc62ba34b0fec10bf4df22958638f54b37e2f9e3d3e0f59e2220045488b2ae7025e12d4480c13c7391b8a8a4199

  • SSDEEP

    196608:WyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:7XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-21_c8478f4f5d94b9ac131ff2d84e5d3909_mafia

    • Size

      11.1MB

    • MD5

      c8478f4f5d94b9ac131ff2d84e5d3909

    • SHA1

      4b7ca3f00711ea4a9c8b5aeef648044fc7e85255

    • SHA256

      8aeb2c30634da05e2c33aec859f61d05a3b0f69d41e76562fe37cc784fc1566c

    • SHA512

      a63d72342ad22ceba03c11a4ffe3e08c37bd9fc62ba34b0fec10bf4df22958638f54b37e2f9e3d3e0f59e2220045488b2ae7025e12d4480c13c7391b8a8a4199

    • SSDEEP

      196608:WyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:7XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks