General

  • Target

    2025-01-27_b6c4b7d510df5fadfb81ebb1348f930f_mafia

  • Size

    14.9MB

  • Sample

    250127-m8fk6svqhy

  • MD5

    b6c4b7d510df5fadfb81ebb1348f930f

  • SHA1

    38db2673c1136571266d4c399205660bc13f5c9d

  • SHA256

    593365bbf1e3ac18c9b361d89c8d80471e90bc0606ccd0a02342b56b0129aee3

  • SHA512

    508ab1a9f384d77c9d80703e9966cc08e353ace669f84f72c74e49942a8bef94221f835d3ed04ebbf60930d68b3a8d7a4c523e1a44fd7bc391e86b15cadc703b

  • SSDEEP

    3072:sLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:JOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-27_b6c4b7d510df5fadfb81ebb1348f930f_mafia

    • Size

      14.9MB

    • MD5

      b6c4b7d510df5fadfb81ebb1348f930f

    • SHA1

      38db2673c1136571266d4c399205660bc13f5c9d

    • SHA256

      593365bbf1e3ac18c9b361d89c8d80471e90bc0606ccd0a02342b56b0129aee3

    • SHA512

      508ab1a9f384d77c9d80703e9966cc08e353ace669f84f72c74e49942a8bef94221f835d3ed04ebbf60930d68b3a8d7a4c523e1a44fd7bc391e86b15cadc703b

    • SSDEEP

      3072:sLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:JOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks