General

  • Target

    2025-01-27_823f52bd7f73c1fc2bdcedb16dd767fb_mafia

  • Size

    14.9MB

  • Sample

    250127-m62evswpfj

  • MD5

    823f52bd7f73c1fc2bdcedb16dd767fb

  • SHA1

    6cd6da79e4a970054a353128de0401c5df146400

  • SHA256

    0ab9ae35fa5dd4cb6ddbdba612fbd5461a7a18da70e72d490dedf9900bbc947e

  • SHA512

    c0ae59e3e2dee62394044d01e6109b4cef06474a447bbb44803f47c3d090c50be19fd31cd43a5834fdf869786cd2076e902bf7d95e175e90556ca29a5650e0b3

  • SSDEEP

    3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/2:yOMdRQr7OB0ypmMXnl8XEPM3noSWOC/

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-27_823f52bd7f73c1fc2bdcedb16dd767fb_mafia

    • Size

      14.9MB

    • MD5

      823f52bd7f73c1fc2bdcedb16dd767fb

    • SHA1

      6cd6da79e4a970054a353128de0401c5df146400

    • SHA256

      0ab9ae35fa5dd4cb6ddbdba612fbd5461a7a18da70e72d490dedf9900bbc947e

    • SHA512

      c0ae59e3e2dee62394044d01e6109b4cef06474a447bbb44803f47c3d090c50be19fd31cd43a5834fdf869786cd2076e902bf7d95e175e90556ca29a5650e0b3

    • SSDEEP

      3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/2:yOMdRQr7OB0ypmMXnl8XEPM3noSWOC/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks