General

  • Target

    2025-01-22_7633c8ebac801ccf8b5f5c6255fb0290_mafia

  • Size

    14.7MB

  • Sample

    250122-ybhj2sspej

  • MD5

    7633c8ebac801ccf8b5f5c6255fb0290

  • SHA1

    01b1b6c617411eaca7b3e453bc0a5411003449f1

  • SHA256

    3b31745de060c31dcb4975f5fbc89419a637e03b80f312984bb145491179e32f

  • SHA512

    40c073563927ebc5ea93d3010823bac125589068940b2eed387b4d3cf87c4089e18299909b893e6eca58c7e05467072d0b8ea11b18aa23739a456f2e5ed45171

  • SSDEEP

    24576:C6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQY:LWdLQk

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-22_7633c8ebac801ccf8b5f5c6255fb0290_mafia

    • Size

      14.7MB

    • MD5

      7633c8ebac801ccf8b5f5c6255fb0290

    • SHA1

      01b1b6c617411eaca7b3e453bc0a5411003449f1

    • SHA256

      3b31745de060c31dcb4975f5fbc89419a637e03b80f312984bb145491179e32f

    • SHA512

      40c073563927ebc5ea93d3010823bac125589068940b2eed387b4d3cf87c4089e18299909b893e6eca58c7e05467072d0b8ea11b18aa23739a456f2e5ed45171

    • SSDEEP

      24576:C6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQY:LWdLQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks