General

  • Target

    2025-01-30_9fba6bf500f826b16e4dd43e6829feec_mafia

  • Size

    10.8MB

  • Sample

    250130-t7smnswqhz

  • MD5

    9fba6bf500f826b16e4dd43e6829feec

  • SHA1

    a6b38df45fb123a59ed0783030b33726c4ee74de

  • SHA256

    d0f978d82cbf058a5b7e9a21adfc71163c858079f27a0d3309562fe8079aea1b

  • SHA512

    7d477aceb07682037c2e5c99c96ada856dcfa41efe2271b214e2f93f87ef64ebaf7c05dcc34a7e8c3065541558e5231068c7284674c531c7689d04274ac9b9b5

  • SSDEEP

    24576:E6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQY:pWdLQk

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_9fba6bf500f826b16e4dd43e6829feec_mafia

    • Size

      10.8MB

    • MD5

      9fba6bf500f826b16e4dd43e6829feec

    • SHA1

      a6b38df45fb123a59ed0783030b33726c4ee74de

    • SHA256

      d0f978d82cbf058a5b7e9a21adfc71163c858079f27a0d3309562fe8079aea1b

    • SHA512

      7d477aceb07682037c2e5c99c96ada856dcfa41efe2271b214e2f93f87ef64ebaf7c05dcc34a7e8c3065541558e5231068c7284674c531c7689d04274ac9b9b5

    • SSDEEP

      24576:E6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQY:pWdLQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks