General

  • Target

    2025-01-28_91e00ddfcee930141b272e4430592f29_mafia

  • Size

    12.3MB

  • Sample

    250128-qex5xasmfq

  • MD5

    91e00ddfcee930141b272e4430592f29

  • SHA1

    db437292dd260d76c88cb026a163a7899564db9f

  • SHA256

    334796ca3f20363eeb932c79b813eaf27f4b3e750965f1f48e129a2280444134

  • SHA512

    26921e09a65f7807653af44142af750127ebad427c9cb1c8beb196c265f4964e3be9b8a9d1504aca4796f2656039e45942d39d90e6ac72a05c14a046b5227d5f

  • SSDEEP

    393216:5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXt:T

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_91e00ddfcee930141b272e4430592f29_mafia

    • Size

      12.3MB

    • MD5

      91e00ddfcee930141b272e4430592f29

    • SHA1

      db437292dd260d76c88cb026a163a7899564db9f

    • SHA256

      334796ca3f20363eeb932c79b813eaf27f4b3e750965f1f48e129a2280444134

    • SHA512

      26921e09a65f7807653af44142af750127ebad427c9cb1c8beb196c265f4964e3be9b8a9d1504aca4796f2656039e45942d39d90e6ac72a05c14a046b5227d5f

    • SSDEEP

      393216:5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXt:T

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks