General

  • Target

    2025-01-24_607550a914787aab3fa1b8809482f62a_mafia

  • Size

    10.0MB

  • Sample

    250124-xk95zssqaw

  • MD5

    607550a914787aab3fa1b8809482f62a

  • SHA1

    44d1170f7a2df77bd26317f2995fb89f1929f96f

  • SHA256

    cb2dc76593135bd01f4c56b8692cc72da95b4177dff085cc47277005d85f1698

  • SHA512

    d747d3daca4d7590556d7dd5df8433b7fa3a928d237a7b7139081f90556361737b059908ffa8a1d2b8f461da6ac414ff685cda8f580ad3ca07fa9345f3155181

  • SSDEEP

    196608:HyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:SXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-24_607550a914787aab3fa1b8809482f62a_mafia

    • Size

      10.0MB

    • MD5

      607550a914787aab3fa1b8809482f62a

    • SHA1

      44d1170f7a2df77bd26317f2995fb89f1929f96f

    • SHA256

      cb2dc76593135bd01f4c56b8692cc72da95b4177dff085cc47277005d85f1698

    • SHA512

      d747d3daca4d7590556d7dd5df8433b7fa3a928d237a7b7139081f90556361737b059908ffa8a1d2b8f461da6ac414ff685cda8f580ad3ca07fa9345f3155181

    • SSDEEP

      196608:HyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:SXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks