General

  • Target

    2025-01-29_b4abb9b0e7781757b18e88bb6af706f8_mafia

  • Size

    11.8MB

  • Sample

    250129-v7dzysvjdy

  • MD5

    b4abb9b0e7781757b18e88bb6af706f8

  • SHA1

    339f0b399c0a05a0c3c18c6745a0208bfffc0728

  • SHA256

    9b7c1f5476a36a29a7f81df68c5aeea0782382ac62ee693c193a00339b79fedd

  • SHA512

    b1eb49b3fbeda25640084a8bb01961b39fc5e883ad2b0006ee7345f37e725fdb4e4031c09cf1643fd79032dd2af6790eb40cea4ead49092d8128e1f40a6a367d

  • SSDEEP

    196608:GyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:rXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-29_b4abb9b0e7781757b18e88bb6af706f8_mafia

    • Size

      11.8MB

    • MD5

      b4abb9b0e7781757b18e88bb6af706f8

    • SHA1

      339f0b399c0a05a0c3c18c6745a0208bfffc0728

    • SHA256

      9b7c1f5476a36a29a7f81df68c5aeea0782382ac62ee693c193a00339b79fedd

    • SHA512

      b1eb49b3fbeda25640084a8bb01961b39fc5e883ad2b0006ee7345f37e725fdb4e4031c09cf1643fd79032dd2af6790eb40cea4ead49092d8128e1f40a6a367d

    • SSDEEP

      196608:GyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:rXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks