General

  • Target

    2025-01-22_5fc6786146b94ac898b3f92178c12f8c_mafia

  • Size

    11.9MB

  • Sample

    250122-x2jz5a1mb1

  • MD5

    5fc6786146b94ac898b3f92178c12f8c

  • SHA1

    f651866837921e7f955b37e635a3fcc022f6cccd

  • SHA256

    c0275dcc143dd32ff138155b06709f06db01aa6e9c67789e3eb71eda6c434592

  • SHA512

    ba10b4fb2ddc346c6ccc96c40bb8c5f04e9a7411ab74e5bbaf1084352ad531ba3c03037a2b2522084516b13a78fd08f3691fd901a70a0a9071045ee66b4c242a

  • SSDEEP

    6144:kLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQI:5TYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-22_5fc6786146b94ac898b3f92178c12f8c_mafia

    • Size

      11.9MB

    • MD5

      5fc6786146b94ac898b3f92178c12f8c

    • SHA1

      f651866837921e7f955b37e635a3fcc022f6cccd

    • SHA256

      c0275dcc143dd32ff138155b06709f06db01aa6e9c67789e3eb71eda6c434592

    • SHA512

      ba10b4fb2ddc346c6ccc96c40bb8c5f04e9a7411ab74e5bbaf1084352ad531ba3c03037a2b2522084516b13a78fd08f3691fd901a70a0a9071045ee66b4c242a

    • SSDEEP

      6144:kLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQI:5TYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks