General

  • Target

    2025-01-28_22e3c237d361b3e4fa05ebbd045f0c12_mafia

  • Size

    11.5MB

  • Sample

    250128-rb5agstnar

  • MD5

    22e3c237d361b3e4fa05ebbd045f0c12

  • SHA1

    74501e3cd15f8a34d1ebe61d2343bce6c85ddf87

  • SHA256

    4363360eba9bacce9d9e19e369cc7c8e872dae2289150471823514c137342f07

  • SHA512

    aca3ae1830be51e36a02b6438765eb141ad3148176f0fce91cb3f31d45082d60db1bcd40118bfced670d0e605857c6d98626e76d64d8051e756c36077244a314

  • SSDEEP

    6144:jLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQu:YTYe+D2jFu+iZoUFhAz7

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_22e3c237d361b3e4fa05ebbd045f0c12_mafia

    • Size

      11.5MB

    • MD5

      22e3c237d361b3e4fa05ebbd045f0c12

    • SHA1

      74501e3cd15f8a34d1ebe61d2343bce6c85ddf87

    • SHA256

      4363360eba9bacce9d9e19e369cc7c8e872dae2289150471823514c137342f07

    • SHA512

      aca3ae1830be51e36a02b6438765eb141ad3148176f0fce91cb3f31d45082d60db1bcd40118bfced670d0e605857c6d98626e76d64d8051e756c36077244a314

    • SSDEEP

      6144:jLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQu:YTYe+D2jFu+iZoUFhAz7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks