General

  • Target

    2025-01-27_f2f54f1fbf2d00a57957de118abe5b58_mafia

  • Size

    13.6MB

  • Sample

    250127-xm5naaslgq

  • MD5

    f2f54f1fbf2d00a57957de118abe5b58

  • SHA1

    7a6c75b8e426032f0dff6cb6137797e006eeef9f

  • SHA256

    4dccb7f03afbc348faecb8eaa98ab867c56b4a84717cd510b83d0621bd7ce5ed

  • SHA512

    955e1150aaff7c30658b7e3009071726ed51f07d4f744ff48890890bbef412c9c1057edec09290c39c8b3a1f34b9906a6d2eb6d7d37ac8fd89542df2df8cfc90

  • SSDEEP

    24576:XEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZt:0fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-27_f2f54f1fbf2d00a57957de118abe5b58_mafia

    • Size

      13.6MB

    • MD5

      f2f54f1fbf2d00a57957de118abe5b58

    • SHA1

      7a6c75b8e426032f0dff6cb6137797e006eeef9f

    • SHA256

      4dccb7f03afbc348faecb8eaa98ab867c56b4a84717cd510b83d0621bd7ce5ed

    • SHA512

      955e1150aaff7c30658b7e3009071726ed51f07d4f744ff48890890bbef412c9c1057edec09290c39c8b3a1f34b9906a6d2eb6d7d37ac8fd89542df2df8cfc90

    • SSDEEP

      24576:XEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZt:0fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks