General

  • Target

    2025-01-26_d186528ba7effe1b0750d9a52d8ab789_mafia

  • Size

    13.9MB

  • Sample

    250126-x2mq1s1rbj

  • MD5

    d186528ba7effe1b0750d9a52d8ab789

  • SHA1

    f5bdea7c9a29b0f3b2ceadc964a338410bf2ca35

  • SHA256

    fdb2e8d2bf18a8f52c8051d5a2c787bfd2478b8d0f8781e7844a40c831489520

  • SHA512

    56ea21d272929b93c7527376cee72f2e7aab277cbc3d1f9b4390479d75e0d4c87532b243514c46cd0a43dd64de26d617834bdcda4e2399107befe02d229d3dc8

  • SSDEEP

    6144:nLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ1:MTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-26_d186528ba7effe1b0750d9a52d8ab789_mafia

    • Size

      13.9MB

    • MD5

      d186528ba7effe1b0750d9a52d8ab789

    • SHA1

      f5bdea7c9a29b0f3b2ceadc964a338410bf2ca35

    • SHA256

      fdb2e8d2bf18a8f52c8051d5a2c787bfd2478b8d0f8781e7844a40c831489520

    • SHA512

      56ea21d272929b93c7527376cee72f2e7aab277cbc3d1f9b4390479d75e0d4c87532b243514c46cd0a43dd64de26d617834bdcda4e2399107befe02d229d3dc8

    • SSDEEP

      6144:nLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ1:MTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks