General

  • Target

    2025-01-30_173d0dae116ce3af630bb816a5016ce6_mafia

  • Size

    12.6MB

  • Sample

    250130-198j8strg1

  • MD5

    173d0dae116ce3af630bb816a5016ce6

  • SHA1

    e922787a276ddb7dcd6a9920f37c69e62c326d69

  • SHA256

    559392ab0d8b5822bfb22af22fa624a4d13ed5dbe2dfb41479b88175c36e115b

  • SHA512

    3c7ac21a257f8b44582b5bf8c337a20cd7053331679ccab22fa1182a516213825ef6bdf182e5253f67c8f61b783aa614045109f5eaff4ace42a16a1149a2c67f

  • SSDEEP

    24576:eEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ5:3fotz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_173d0dae116ce3af630bb816a5016ce6_mafia

    • Size

      12.6MB

    • MD5

      173d0dae116ce3af630bb816a5016ce6

    • SHA1

      e922787a276ddb7dcd6a9920f37c69e62c326d69

    • SHA256

      559392ab0d8b5822bfb22af22fa624a4d13ed5dbe2dfb41479b88175c36e115b

    • SHA512

      3c7ac21a257f8b44582b5bf8c337a20cd7053331679ccab22fa1182a516213825ef6bdf182e5253f67c8f61b783aa614045109f5eaff4ace42a16a1149a2c67f

    • SSDEEP

      24576:eEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ5:3fotz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks