General

  • Target

    2025-01-30_f0bfff82b4873196d13a495b6b655055_mafia

  • Size

    13.1MB

  • Sample

    250130-yxtt7stlhp

  • MD5

    f0bfff82b4873196d13a495b6b655055

  • SHA1

    e0e570d3002dfcc34c0cbf1adf78ee311bd8b2fe

  • SHA256

    59a4252fc5f03645821316b1d732ff452368561d8c4b2afd22bf2feb7dd98388

  • SHA512

    b8e2c7e5d81710036c95c1820f83e03bf4093345570790509417224d77c935864b5114562740400353f0af9241331f0e00afa9a4dff43b568d51263d6771a691

  • SSDEEP

    49152:XqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPJ:XqtYc3m

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-30_f0bfff82b4873196d13a495b6b655055_mafia

    • Size

      13.1MB

    • MD5

      f0bfff82b4873196d13a495b6b655055

    • SHA1

      e0e570d3002dfcc34c0cbf1adf78ee311bd8b2fe

    • SHA256

      59a4252fc5f03645821316b1d732ff452368561d8c4b2afd22bf2feb7dd98388

    • SHA512

      b8e2c7e5d81710036c95c1820f83e03bf4093345570790509417224d77c935864b5114562740400353f0af9241331f0e00afa9a4dff43b568d51263d6771a691

    • SSDEEP

      49152:XqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPJ:XqtYc3m

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.