General

  • Target

    2025-01-30_01ce0b7b263a7b88ed3337ec93dfbcda_mafia

  • Size

    14.9MB

  • Sample

    250130-1xsm9atpbt

  • MD5

    01ce0b7b263a7b88ed3337ec93dfbcda

  • SHA1

    a2a8a7c25f8b7f07da55ef908564ed915f106e20

  • SHA256

    fa934669d49ba9f600ff6b424b2b52f5c6db653a8f5044e003939630ec21edaf

  • SHA512

    ce6130a1eb3e216ea52a0b5138e4cf616e97de0f498e60ee61880894c358f68dd304bde9fb7d6a9211b0be34c9fc5bfe9005726cda988bd59f9fbcad4d3653e8

  • SSDEEP

    3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/v:yOMdRQr7OB0ypmMXnl8XEPM3noSWOCu

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_01ce0b7b263a7b88ed3337ec93dfbcda_mafia

    • Size

      14.9MB

    • MD5

      01ce0b7b263a7b88ed3337ec93dfbcda

    • SHA1

      a2a8a7c25f8b7f07da55ef908564ed915f106e20

    • SHA256

      fa934669d49ba9f600ff6b424b2b52f5c6db653a8f5044e003939630ec21edaf

    • SHA512

      ce6130a1eb3e216ea52a0b5138e4cf616e97de0f498e60ee61880894c358f68dd304bde9fb7d6a9211b0be34c9fc5bfe9005726cda988bd59f9fbcad4d3653e8

    • SSDEEP

      3072:LLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/v:yOMdRQr7OB0ypmMXnl8XEPM3noSWOCu

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks