General

  • Target

    2025-01-27_bb484f2658e25cf47716a1aa2ecaad68_mafia

  • Size

    11.7MB

  • Sample

    250127-xgrjgaskan

  • MD5

    bb484f2658e25cf47716a1aa2ecaad68

  • SHA1

    7570818d2ccf234623d65fb86a9abe0ebecc5386

  • SHA256

    e0ba128a036a2cd1f4100d7f12f8e5b09c083afc8e1edd5dd1fabc23cfedcbd8

  • SHA512

    6966e6e0e07fad2748f956f2305c22b6f7ed62503f3ad5a7bbbcd4c91949016ae31c610406a43dfb2fe553a5ce4e7b81ae717d0024482860f55efa52e1544d69

  • SSDEEP

    196608:NyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:YXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-27_bb484f2658e25cf47716a1aa2ecaad68_mafia

    • Size

      11.7MB

    • MD5

      bb484f2658e25cf47716a1aa2ecaad68

    • SHA1

      7570818d2ccf234623d65fb86a9abe0ebecc5386

    • SHA256

      e0ba128a036a2cd1f4100d7f12f8e5b09c083afc8e1edd5dd1fabc23cfedcbd8

    • SHA512

      6966e6e0e07fad2748f956f2305c22b6f7ed62503f3ad5a7bbbcd4c91949016ae31c610406a43dfb2fe553a5ce4e7b81ae717d0024482860f55efa52e1544d69

    • SSDEEP

      196608:NyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:YXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks