General

  • Target

    2025-01-25_8c94d6b3385483ea8c78bc863da3bb6e_mafia

  • Size

    12.4MB

  • Sample

    250125-xfmh5awldy

  • MD5

    8c94d6b3385483ea8c78bc863da3bb6e

  • SHA1

    f45058578f354f8b9a2b64c91cdaec3354250403

  • SHA256

    520936f0d45054384bedb2f685da3b9d47c9bd989d552c856cc758d7c42b5701

  • SHA512

    aac43c83d709b547ef5720642e1cf0d9c2f8d55cb4357ce04a32e28f002133230f8ec5de8686e2e5891fb55f29d1f7584b94858258144f19df4e0f630218925b

  • SSDEEP

    49152:nqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:nqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-25_8c94d6b3385483ea8c78bc863da3bb6e_mafia

    • Size

      12.4MB

    • MD5

      8c94d6b3385483ea8c78bc863da3bb6e

    • SHA1

      f45058578f354f8b9a2b64c91cdaec3354250403

    • SHA256

      520936f0d45054384bedb2f685da3b9d47c9bd989d552c856cc758d7c42b5701

    • SHA512

      aac43c83d709b547ef5720642e1cf0d9c2f8d55cb4357ce04a32e28f002133230f8ec5de8686e2e5891fb55f29d1f7584b94858258144f19df4e0f630218925b

    • SSDEEP

      49152:nqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:nqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks