General

  • Target

    2025-01-26_59add1cca37057d8d2bf397f9a6c0da7_mafia

  • Size

    14.1MB

  • Sample

    250126-w4zmxsyphy

  • MD5

    59add1cca37057d8d2bf397f9a6c0da7

  • SHA1

    240a0a464b6184b25b6a3b46f506f65b5545d824

  • SHA256

    360f1feceab5a16cd0a3a2d955380d613aee482172bcadc1a700248fb62f39c9

  • SHA512

    3f03f09e004f1698b4e4691388c44a2c7c0bcecc711f0b4fa0bb8b11a2c8da284cda4053ccffcaa9e0891beed2463f2e246c5d5e4867e29eaab96aa15422b88c

  • SSDEEP

    24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:4fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-26_59add1cca37057d8d2bf397f9a6c0da7_mafia

    • Size

      14.1MB

    • MD5

      59add1cca37057d8d2bf397f9a6c0da7

    • SHA1

      240a0a464b6184b25b6a3b46f506f65b5545d824

    • SHA256

      360f1feceab5a16cd0a3a2d955380d613aee482172bcadc1a700248fb62f39c9

    • SHA512

      3f03f09e004f1698b4e4691388c44a2c7c0bcecc711f0b4fa0bb8b11a2c8da284cda4053ccffcaa9e0891beed2463f2e246c5d5e4867e29eaab96aa15422b88c

    • SSDEEP

      24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:4fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks