General

  • Target

    2025-01-30_5c21d1621ae8aed4b888874b6440a2b6_mafia

  • Size

    10.9MB

  • Sample

    250130-ysh7xatkfl

  • MD5

    5c21d1621ae8aed4b888874b6440a2b6

  • SHA1

    6aee183901b7c8e9fcdfd96111d8e738d90d8caa

  • SHA256

    db4582f33b218c1bfd904c331e03acd29217b75397b608c2e45352dfa9111613

  • SHA512

    ca39fef8c7376f085ccf808fdb4b20d0e171ac7e62cc1e2150804114cdc5c6abeab0926a43c98142d993a59aaf26ae6dde40873aba17a7a72bb76152e8733a9c

  • SSDEEP

    24576:TpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt7:Voop

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_5c21d1621ae8aed4b888874b6440a2b6_mafia

    • Size

      10.9MB

    • MD5

      5c21d1621ae8aed4b888874b6440a2b6

    • SHA1

      6aee183901b7c8e9fcdfd96111d8e738d90d8caa

    • SHA256

      db4582f33b218c1bfd904c331e03acd29217b75397b608c2e45352dfa9111613

    • SHA512

      ca39fef8c7376f085ccf808fdb4b20d0e171ac7e62cc1e2150804114cdc5c6abeab0926a43c98142d993a59aaf26ae6dde40873aba17a7a72bb76152e8733a9c

    • SSDEEP

      24576:TpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt7:Voop

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks