General

  • Target

    2025-01-28_97f05b514a867f29502c66a18573b6e1_mafia

  • Size

    12.7MB

  • Sample

    250128-sf1zasslhw

  • MD5

    97f05b514a867f29502c66a18573b6e1

  • SHA1

    e3ad4e5ebb38ef6c1808e33ba73a8f94593748c6

  • SHA256

    88363bf0c273a65c292dc131c24538ffa519d2ba016d287c4d9be0d921a4d949

  • SHA512

    d4e00ff51b2dbeed0d3b9890d41c0ada4557488375f52484d5319264334c63f55d150f80383593f5d68ca076a30d92cf7b1a1c8f6e118f2c08e742f21d510a50

  • SSDEEP

    24576:GEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:/fotj

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_97f05b514a867f29502c66a18573b6e1_mafia

    • Size

      12.7MB

    • MD5

      97f05b514a867f29502c66a18573b6e1

    • SHA1

      e3ad4e5ebb38ef6c1808e33ba73a8f94593748c6

    • SHA256

      88363bf0c273a65c292dc131c24538ffa519d2ba016d287c4d9be0d921a4d949

    • SHA512

      d4e00ff51b2dbeed0d3b9890d41c0ada4557488375f52484d5319264334c63f55d150f80383593f5d68ca076a30d92cf7b1a1c8f6e118f2c08e742f21d510a50

    • SSDEEP

      24576:GEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:/fotj

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks