General

  • Target

    2025-01-24_ea224388b4e876dc9b37724ee20f15f3_mafia

  • Size

    13.2MB

  • Sample

    250124-xxkqvsvnhk

  • MD5

    ea224388b4e876dc9b37724ee20f15f3

  • SHA1

    0d5a7b79e2775a3927aacf1a619f256bca67f23c

  • SHA256

    a51519e61a97c8604ee59ff7d041604094d7f75e3c5c15c59cebee44eb8d7146

  • SHA512

    f47274f54587cbba207e4b19c8ed5d744e2881afca6e74de4364acc88b75d8eb3a5e810330a16e7e586e35089e59cc1391195a19f703062566128b990ad904bb

  • SSDEEP

    393216:cXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-24_ea224388b4e876dc9b37724ee20f15f3_mafia

    • Size

      13.2MB

    • MD5

      ea224388b4e876dc9b37724ee20f15f3

    • SHA1

      0d5a7b79e2775a3927aacf1a619f256bca67f23c

    • SHA256

      a51519e61a97c8604ee59ff7d041604094d7f75e3c5c15c59cebee44eb8d7146

    • SHA512

      f47274f54587cbba207e4b19c8ed5d744e2881afca6e74de4364acc88b75d8eb3a5e810330a16e7e586e35089e59cc1391195a19f703062566128b990ad904bb

    • SSDEEP

      393216:cXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks