General

  • Target

    2025-01-28_c637089ab54314c90986ec81a304e0dc_mafia

  • Size

    12.0MB

  • Sample

    250128-v9w9bayrej

  • MD5

    c637089ab54314c90986ec81a304e0dc

  • SHA1

    014dc7831a4f8177e5fc23937859b89e0de2de6b

  • SHA256

    4940b64d036adb8a281feeb4976cbf45c0e465ac4ee72f0c37a7a1e1ff56de2c

  • SHA512

    914a2fdade109e75eefc435498d23a1a72f6b27ae146432bbab4c125f0d98429e9fb93982607714c2a9c011138c46d7d70188f4385fd684c1cd89a5cc82a1acd

  • SSDEEP

    24576:MpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttd:ooo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-28_c637089ab54314c90986ec81a304e0dc_mafia

    • Size

      12.0MB

    • MD5

      c637089ab54314c90986ec81a304e0dc

    • SHA1

      014dc7831a4f8177e5fc23937859b89e0de2de6b

    • SHA256

      4940b64d036adb8a281feeb4976cbf45c0e465ac4ee72f0c37a7a1e1ff56de2c

    • SHA512

      914a2fdade109e75eefc435498d23a1a72f6b27ae146432bbab4c125f0d98429e9fb93982607714c2a9c011138c46d7d70188f4385fd684c1cd89a5cc82a1acd

    • SSDEEP

      24576:MpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttd:ooo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks