General

  • Target

    2025-01-24_fe68e1702fa55d9c6125bbeb3026a5b8_mafia

  • Size

    13.6MB

  • Sample

    250124-xzf6fsvpgn

  • MD5

    fe68e1702fa55d9c6125bbeb3026a5b8

  • SHA1

    3a1cac180b422f57c7a1576baa3f16f09f6c7b7e

  • SHA256

    cc9bf7bab2fa10c5b0cdf790586f29f15e3112bd6aa289a2175a1e5aca190993

  • SHA512

    03dd144e41475bc9c51122571aa9c78304ea8d4b11c1b28d2028813c45392862d8608ac6aa2c21ecd17e4350730f462fc3fb25a4cb2516744e3a166ebf0e33a4

  • SSDEEP

    24576:REfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZb:qfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-24_fe68e1702fa55d9c6125bbeb3026a5b8_mafia

    • Size

      13.6MB

    • MD5

      fe68e1702fa55d9c6125bbeb3026a5b8

    • SHA1

      3a1cac180b422f57c7a1576baa3f16f09f6c7b7e

    • SHA256

      cc9bf7bab2fa10c5b0cdf790586f29f15e3112bd6aa289a2175a1e5aca190993

    • SHA512

      03dd144e41475bc9c51122571aa9c78304ea8d4b11c1b28d2028813c45392862d8608ac6aa2c21ecd17e4350730f462fc3fb25a4cb2516744e3a166ebf0e33a4

    • SSDEEP

      24576:REfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZb:qfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks