General

  • Target

    2025-01-28_11aeeea1fb4ac1baab9cddc4d9874697_mafia

  • Size

    13.7MB

  • Sample

    250128-jj9k6ssmfn

  • MD5

    11aeeea1fb4ac1baab9cddc4d9874697

  • SHA1

    3780806f980d32c23d90be9e1b089909fa0e4675

  • SHA256

    dc3d7c629554006086744cd6eebd0acffa1fb20bed484529bc6904c664a1f08c

  • SHA512

    46bc88078b0ff654de1ed378f9c7ac348f3662f025f5be1cce9f22d2475430e316a86699877a694decd19f8c954aae15cd4c7c49b94db532d2233170589f7f7e

  • SSDEEP

    49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:9qtYc30

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_11aeeea1fb4ac1baab9cddc4d9874697_mafia

    • Size

      13.7MB

    • MD5

      11aeeea1fb4ac1baab9cddc4d9874697

    • SHA1

      3780806f980d32c23d90be9e1b089909fa0e4675

    • SHA256

      dc3d7c629554006086744cd6eebd0acffa1fb20bed484529bc6904c664a1f08c

    • SHA512

      46bc88078b0ff654de1ed378f9c7ac348f3662f025f5be1cce9f22d2475430e316a86699877a694decd19f8c954aae15cd4c7c49b94db532d2233170589f7f7e

    • SSDEEP

      49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:9qtYc30

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks