General

  • Target

    2025-01-22_7f4786a6e4fe97bfaeabe361924a8ca6_mafia

  • Size

    13.8MB

  • Sample

    250122-w9c14szqbl

  • MD5

    7f4786a6e4fe97bfaeabe361924a8ca6

  • SHA1

    454802abca610637ef6013398f5dcafdd27a7463

  • SHA256

    4119c0f3104f7ad95952a660548c28ec83c7b27b11bf67b672043d5dd954bbc7

  • SHA512

    54ac466948e203894c2e1f3d4a22794a4e18e9e11f98b1b65d3935860c7af80a5f2d2542f878f14e110cda3c30d23f59a98b4442e51ccc0471c20e012209ec18

  • SSDEEP

    49152:SqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:SqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-22_7f4786a6e4fe97bfaeabe361924a8ca6_mafia

    • Size

      13.8MB

    • MD5

      7f4786a6e4fe97bfaeabe361924a8ca6

    • SHA1

      454802abca610637ef6013398f5dcafdd27a7463

    • SHA256

      4119c0f3104f7ad95952a660548c28ec83c7b27b11bf67b672043d5dd954bbc7

    • SHA512

      54ac466948e203894c2e1f3d4a22794a4e18e9e11f98b1b65d3935860c7af80a5f2d2542f878f14e110cda3c30d23f59a98b4442e51ccc0471c20e012209ec18

    • SSDEEP

      49152:SqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:SqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks