General

  • Target

    2025-01-29_cf2e3c0be26450cbab80b728d8789650_mafia

  • Size

    12.4MB

  • Sample

    250129-v91azatlan

  • MD5

    cf2e3c0be26450cbab80b728d8789650

  • SHA1

    58f4d81c6127d6da8dfde18fdfaa433aba54af12

  • SHA256

    dc7c95788c1c469180356c18a99f3ad1b71f609eabbd51a85966f83f245c252b

  • SHA512

    3f8222faa36a11ab4d0344cc475902d5a482dd58ef4b2922cf536dcc62c076a678fa6ffc34ffbc3b3215709032c790d19ca613b138b09a174756dce656cb974c

  • SSDEEP

    49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:zqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-29_cf2e3c0be26450cbab80b728d8789650_mafia

    • Size

      12.4MB

    • MD5

      cf2e3c0be26450cbab80b728d8789650

    • SHA1

      58f4d81c6127d6da8dfde18fdfaa433aba54af12

    • SHA256

      dc7c95788c1c469180356c18a99f3ad1b71f609eabbd51a85966f83f245c252b

    • SHA512

      3f8222faa36a11ab4d0344cc475902d5a482dd58ef4b2922cf536dcc62c076a678fa6ffc34ffbc3b3215709032c790d19ca613b138b09a174756dce656cb974c

    • SSDEEP

      49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:zqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks