General

  • Target

    2025-01-24_52b91309c66d80cd8a82bb089b0e8de2_mafia

  • Size

    10.7MB

  • Sample

    250124-w8kdsstlbp

  • MD5

    52b91309c66d80cd8a82bb089b0e8de2

  • SHA1

    80738496505450e702a421eff90b9acb1e5f13dc

  • SHA256

    150521375c727ba9d9bba4e7dec6247c40807028436ec465d95ba8569fb4c234

  • SHA512

    7ce8505253a5b17258fd6ce515297769173019e75e29015b4fcbb107c48a742bbd3acc4faa78c6a3d9c54087074be24ca3e969b0752767331bbee63327996895

  • SSDEEP

    24576:oEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZf:lfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-24_52b91309c66d80cd8a82bb089b0e8de2_mafia

    • Size

      10.7MB

    • MD5

      52b91309c66d80cd8a82bb089b0e8de2

    • SHA1

      80738496505450e702a421eff90b9acb1e5f13dc

    • SHA256

      150521375c727ba9d9bba4e7dec6247c40807028436ec465d95ba8569fb4c234

    • SHA512

      7ce8505253a5b17258fd6ce515297769173019e75e29015b4fcbb107c48a742bbd3acc4faa78c6a3d9c54087074be24ca3e969b0752767331bbee63327996895

    • SSDEEP

      24576:oEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZf:lfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks