General

  • Target

    2025-01-28_48aef0f0988a64f18348e4b39346e2ac_mafia

  • Size

    12.8MB

  • Sample

    250128-v3n95awlgt

  • MD5

    48aef0f0988a64f18348e4b39346e2ac

  • SHA1

    0c97b84c07208aae8742fba4d6699185c19e247a

  • SHA256

    b473616b0f304d267ffb1744d642af6c12fe6de23156c7762c943d460dafd371

  • SHA512

    1554636eda69ba604915169212adb3d56bf634e5274e95a98d7df3b3426020a6437e9fd3ba36eefaf5bf93d682558ab03ea2fa1c01feb37ebf85a002c7760e67

  • SSDEEP

    24576:mpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttn:qoo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_48aef0f0988a64f18348e4b39346e2ac_mafia

    • Size

      12.8MB

    • MD5

      48aef0f0988a64f18348e4b39346e2ac

    • SHA1

      0c97b84c07208aae8742fba4d6699185c19e247a

    • SHA256

      b473616b0f304d267ffb1744d642af6c12fe6de23156c7762c943d460dafd371

    • SHA512

      1554636eda69ba604915169212adb3d56bf634e5274e95a98d7df3b3426020a6437e9fd3ba36eefaf5bf93d682558ab03ea2fa1c01feb37ebf85a002c7760e67

    • SSDEEP

      24576:mpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttn:qoo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks