General

  • Target

    2025-01-25_4c84596bb67adb966181bac9a7abcc36_mafia

  • Size

    10.1MB

  • Sample

    250125-xfj31awldv

  • MD5

    4c84596bb67adb966181bac9a7abcc36

  • SHA1

    da214228e670ea1422ba6906958af114aab704f9

  • SHA256

    d79b15983c9b584068dc9b1282bad7310071132581c81b58ee813180b1fd409f

  • SHA512

    621f5f3a28d4c0b13bb959e6a9b11392902ce342d3fbcfdd64c1c74656ea7bb20d4b12ced83b4a0a72327ae9b989fbfe78999caba31ee349c08dedf4393a97b6

  • SSDEEP

    49152:SLFuiE888888888888888888888888888888888888888888888888888888888/:SLM

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-25_4c84596bb67adb966181bac9a7abcc36_mafia

    • Size

      10.1MB

    • MD5

      4c84596bb67adb966181bac9a7abcc36

    • SHA1

      da214228e670ea1422ba6906958af114aab704f9

    • SHA256

      d79b15983c9b584068dc9b1282bad7310071132581c81b58ee813180b1fd409f

    • SHA512

      621f5f3a28d4c0b13bb959e6a9b11392902ce342d3fbcfdd64c1c74656ea7bb20d4b12ced83b4a0a72327ae9b989fbfe78999caba31ee349c08dedf4393a97b6

    • SSDEEP

      49152:SLFuiE888888888888888888888888888888888888888888888888888888888/:SLM

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks