General

  • Target

    2025-01-22_c2ba4ec1ff02e603663c83ae177f37cb_mafia

  • Size

    10.8MB

  • Sample

    250122-xegw9a1jgq

  • MD5

    c2ba4ec1ff02e603663c83ae177f37cb

  • SHA1

    12da4811e21c55fc6d49150f7bd1f70e25d1e349

  • SHA256

    cf9c45694ab7273150895ccd26f843d983702b838b11df8d517378705c5b69e9

  • SHA512

    4566a08e2fcb953efa778077d695f85b7d50dabdf3b266e1dd959481eaef7704724e6267f7f2ca8fd914129045c61670ae524b577e95f78a4d83bf104880dd0a

  • SSDEEP

    49152:WqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:WqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-22_c2ba4ec1ff02e603663c83ae177f37cb_mafia

    • Size

      10.8MB

    • MD5

      c2ba4ec1ff02e603663c83ae177f37cb

    • SHA1

      12da4811e21c55fc6d49150f7bd1f70e25d1e349

    • SHA256

      cf9c45694ab7273150895ccd26f843d983702b838b11df8d517378705c5b69e9

    • SHA512

      4566a08e2fcb953efa778077d695f85b7d50dabdf3b266e1dd959481eaef7704724e6267f7f2ca8fd914129045c61670ae524b577e95f78a4d83bf104880dd0a

    • SSDEEP

      49152:WqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:WqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks