General

  • Target

    2025-01-21_e3a32c1ce738d32fd2833ac693d0bdb5_mafia

  • Size

    13.6MB

  • Sample

    250121-chtp1a1jdk

  • MD5

    e3a32c1ce738d32fd2833ac693d0bdb5

  • SHA1

    1ecb711108d3ad9a67df2d302eef34031f53f91e

  • SHA256

    1b564e720d600b5b4ea45fe242f595c54e356da8f88c2e60c198636df27eab9a

  • SHA512

    2d810b3845c1c3b84cbe02999561c984b076aa7c40406c6594d3828b8d95f9239fca74819bc863a91bab6c221b71299d56fc4cd10cdb8e62de42e18069940525

  • SSDEEP

    49152:aqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:aqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-21_e3a32c1ce738d32fd2833ac693d0bdb5_mafia

    • Size

      13.6MB

    • MD5

      e3a32c1ce738d32fd2833ac693d0bdb5

    • SHA1

      1ecb711108d3ad9a67df2d302eef34031f53f91e

    • SHA256

      1b564e720d600b5b4ea45fe242f595c54e356da8f88c2e60c198636df27eab9a

    • SHA512

      2d810b3845c1c3b84cbe02999561c984b076aa7c40406c6594d3828b8d95f9239fca74819bc863a91bab6c221b71299d56fc4cd10cdb8e62de42e18069940525

    • SSDEEP

      49152:aqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:aqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks