General

  • Target

    2025-01-28_0e10aea1cfb39b35a3a5b283d31fd5bf_mafia

  • Size

    13.0MB

  • Sample

    250128-bv4v3asmez

  • MD5

    0e10aea1cfb39b35a3a5b283d31fd5bf

  • SHA1

    0d849c20326f2c9522c60bb8e28afe0d955c5898

  • SHA256

    6750b6fb0c62f8dbb8d2c65aa6149f1a08fc3e0da333449e56d735ad52e7898e

  • SHA512

    3a0e37fe7fd49ff71635cddf0d8514ebe826a9521c45f45c6ec215983c79a83a9bf65dd64547e57a1b623604ec4fa4d1240503b07b4ae7381af3f19ee1debb05

  • SSDEEP

    24576:qpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttJ:+oo/

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_0e10aea1cfb39b35a3a5b283d31fd5bf_mafia

    • Size

      13.0MB

    • MD5

      0e10aea1cfb39b35a3a5b283d31fd5bf

    • SHA1

      0d849c20326f2c9522c60bb8e28afe0d955c5898

    • SHA256

      6750b6fb0c62f8dbb8d2c65aa6149f1a08fc3e0da333449e56d735ad52e7898e

    • SHA512

      3a0e37fe7fd49ff71635cddf0d8514ebe826a9521c45f45c6ec215983c79a83a9bf65dd64547e57a1b623604ec4fa4d1240503b07b4ae7381af3f19ee1debb05

    • SSDEEP

      24576:qpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttJ:+oo/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks