General

  • Target

    2025-01-22_19e2f6a4fa8ae5d5889b48da3e34466f_mafia

  • Size

    13.0MB

  • Sample

    250122-xjjxeaznd1

  • MD5

    19e2f6a4fa8ae5d5889b48da3e34466f

  • SHA1

    1e07305a902172739d0e4ae63bbb98b65ec1a0af

  • SHA256

    02f0a01080d960877b24986a1352f0ff73578bd313399d1c51aa4cfe16e71e00

  • SHA512

    77946cb445022af663f63b82806d7dee9efb4d6d3f5f0cb380f68ad10b0e35decb49f7bd76354f0ca9b6073095852b0c526c4bedc434412f22e65ab70c983d6b

  • SSDEEP

    24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ/:ofot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-22_19e2f6a4fa8ae5d5889b48da3e34466f_mafia

    • Size

      13.0MB

    • MD5

      19e2f6a4fa8ae5d5889b48da3e34466f

    • SHA1

      1e07305a902172739d0e4ae63bbb98b65ec1a0af

    • SHA256

      02f0a01080d960877b24986a1352f0ff73578bd313399d1c51aa4cfe16e71e00

    • SHA512

      77946cb445022af663f63b82806d7dee9efb4d6d3f5f0cb380f68ad10b0e35decb49f7bd76354f0ca9b6073095852b0c526c4bedc434412f22e65ab70c983d6b

    • SSDEEP

      24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ/:ofot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks