General

  • Target

    2025-01-30_f0bfff82b4873196d13a495b6b655055_mafia

  • Size

    13.1MB

  • Sample

    250130-yp5xha1mgv

  • MD5

    f0bfff82b4873196d13a495b6b655055

  • SHA1

    e0e570d3002dfcc34c0cbf1adf78ee311bd8b2fe

  • SHA256

    59a4252fc5f03645821316b1d732ff452368561d8c4b2afd22bf2feb7dd98388

  • SHA512

    b8e2c7e5d81710036c95c1820f83e03bf4093345570790509417224d77c935864b5114562740400353f0af9241331f0e00afa9a4dff43b568d51263d6771a691

  • SSDEEP

    49152:XqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPJ:XqtYc3m

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_f0bfff82b4873196d13a495b6b655055_mafia

    • Size

      13.1MB

    • MD5

      f0bfff82b4873196d13a495b6b655055

    • SHA1

      e0e570d3002dfcc34c0cbf1adf78ee311bd8b2fe

    • SHA256

      59a4252fc5f03645821316b1d732ff452368561d8c4b2afd22bf2feb7dd98388

    • SHA512

      b8e2c7e5d81710036c95c1820f83e03bf4093345570790509417224d77c935864b5114562740400353f0af9241331f0e00afa9a4dff43b568d51263d6771a691

    • SSDEEP

      49152:XqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPJ:XqtYc3m

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks