General

  • Target

    2025-01-26_7e811bc48a3afad994b009290155bd03_mafia

  • Size

    11.3MB

  • Sample

    250126-w6mfdayqdt

  • MD5

    7e811bc48a3afad994b009290155bd03

  • SHA1

    d24e61a923e21d81f8e555ac0d7b3d7341177609

  • SHA256

    3d2272265667eadf95c4998225f5ace4d9ef3afc0994de38319ac123c672a9df

  • SHA512

    416378350a3546622bbc8b88095845016f58abe386c0a5288a8120ee938b96ea8353f488ea11f037e1f9ddde51fd795820a9835730bef66ff4ceee1d152b7d18

  • SSDEEP

    49152:aqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:aqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-26_7e811bc48a3afad994b009290155bd03_mafia

    • Size

      11.3MB

    • MD5

      7e811bc48a3afad994b009290155bd03

    • SHA1

      d24e61a923e21d81f8e555ac0d7b3d7341177609

    • SHA256

      3d2272265667eadf95c4998225f5ace4d9ef3afc0994de38319ac123c672a9df

    • SHA512

      416378350a3546622bbc8b88095845016f58abe386c0a5288a8120ee938b96ea8353f488ea11f037e1f9ddde51fd795820a9835730bef66ff4ceee1d152b7d18

    • SSDEEP

      49152:aqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:aqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks