General

  • Target

    2025-01-25_6318219e47326940bedbba8cf354dd24_mafia

  • Size

    10.7MB

  • Sample

    250125-xcnxsawjgx

  • MD5

    6318219e47326940bedbba8cf354dd24

  • SHA1

    ff83e6cd1917f7f383eab9661d077feb5ec5de18

  • SHA256

    058a4b0cbcd8d007a10abd24a3c4abf244a043d0b7aba2c09f7aed9177beb2b1

  • SHA512

    bf0655b83e182eb37599bf46fa02edca7c75a15569c716abf17cd8f9531ada94535dd1154e32e9f274bd1b7553f43a051ad69bb1dcd2c55aded644dc1746dfda

  • SSDEEP

    49152:YqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:YqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-25_6318219e47326940bedbba8cf354dd24_mafia

    • Size

      10.7MB

    • MD5

      6318219e47326940bedbba8cf354dd24

    • SHA1

      ff83e6cd1917f7f383eab9661d077feb5ec5de18

    • SHA256

      058a4b0cbcd8d007a10abd24a3c4abf244a043d0b7aba2c09f7aed9177beb2b1

    • SHA512

      bf0655b83e182eb37599bf46fa02edca7c75a15569c716abf17cd8f9531ada94535dd1154e32e9f274bd1b7553f43a051ad69bb1dcd2c55aded644dc1746dfda

    • SSDEEP

      49152:YqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:YqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks