General

  • Target

    2025-01-31_17cdf5af0f3bbd44fe4a61faee6c856e_mafia

  • Size

    10.2MB

  • Sample

    250131-f2njwa1kbm

  • MD5

    17cdf5af0f3bbd44fe4a61faee6c856e

  • SHA1

    7cfd9c4f5cb3b202aa5abe7b39dd17c429fb6098

  • SHA256

    07624eb5d8e98eb16931b1d103e293f60cb1e832ada9c57bc9b188ef04d99511

  • SHA512

    adcce1d8653628e6b9faa870e1042cf8cb3521b05653d0af6a7e753558a6eeb91e523a329af0773962a4d73d2037c9c36d8b38d98f9192f940a3f7f92e547a03

  • SSDEEP

    24576:RpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttD:roo9

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_17cdf5af0f3bbd44fe4a61faee6c856e_mafia

    • Size

      10.2MB

    • MD5

      17cdf5af0f3bbd44fe4a61faee6c856e

    • SHA1

      7cfd9c4f5cb3b202aa5abe7b39dd17c429fb6098

    • SHA256

      07624eb5d8e98eb16931b1d103e293f60cb1e832ada9c57bc9b188ef04d99511

    • SHA512

      adcce1d8653628e6b9faa870e1042cf8cb3521b05653d0af6a7e753558a6eeb91e523a329af0773962a4d73d2037c9c36d8b38d98f9192f940a3f7f92e547a03

    • SSDEEP

      24576:RpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttD:roo9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks