General

  • Target

    2025-01-30_8bdbca894376b8c9a864ac11879ddb58_mafia

  • Size

    12.8MB

  • Sample

    250130-ys2dgs1nft

  • MD5

    8bdbca894376b8c9a864ac11879ddb58

  • SHA1

    8edf0912d7a6574770ec52d56d89ced568d5c5ab

  • SHA256

    0fa9658a9944e2a5fd88eb5fa7b9bd44cd065257f3aeaac1e645566f0fecd131

  • SHA512

    974fbcdeaf2219b4fe8fcb4e95e740dbb705c6f8460147fd8f73f073fd387c0d70127a2bc9ed989310ddee9d21e2a1c4b1d319435dd73ce0c1ca364386a6690f

  • SSDEEP

    49152:dqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:dqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_8bdbca894376b8c9a864ac11879ddb58_mafia

    • Size

      12.8MB

    • MD5

      8bdbca894376b8c9a864ac11879ddb58

    • SHA1

      8edf0912d7a6574770ec52d56d89ced568d5c5ab

    • SHA256

      0fa9658a9944e2a5fd88eb5fa7b9bd44cd065257f3aeaac1e645566f0fecd131

    • SHA512

      974fbcdeaf2219b4fe8fcb4e95e740dbb705c6f8460147fd8f73f073fd387c0d70127a2bc9ed989310ddee9d21e2a1c4b1d319435dd73ce0c1ca364386a6690f

    • SSDEEP

      49152:dqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:dqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.