General

  • Target

    2025-01-31_a115c76529a4790992d6585ccc323b5d_mafia

  • Size

    13.6MB

  • Sample

    250131-f4fbaa1kcl

  • MD5

    a115c76529a4790992d6585ccc323b5d

  • SHA1

    d55d060919f5bde9f5d420f4f9162fd48df1914d

  • SHA256

    843a04f3e1acdd78a036dd537c4840daed7f2b3e8b7f8472c3c20af5a888092b

  • SHA512

    5b006c4ea6b3355561ab5bfd5b2225d39c610f55b2005e816c74f884ba04e896ce091a8a6e1071732fcb4dc41c3d1f8ca1f320897bf2c72135b57f5a468eb275

  • SSDEEP

    24576:XEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZJ:0fotP

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_a115c76529a4790992d6585ccc323b5d_mafia

    • Size

      13.6MB

    • MD5

      a115c76529a4790992d6585ccc323b5d

    • SHA1

      d55d060919f5bde9f5d420f4f9162fd48df1914d

    • SHA256

      843a04f3e1acdd78a036dd537c4840daed7f2b3e8b7f8472c3c20af5a888092b

    • SHA512

      5b006c4ea6b3355561ab5bfd5b2225d39c610f55b2005e816c74f884ba04e896ce091a8a6e1071732fcb4dc41c3d1f8ca1f320897bf2c72135b57f5a468eb275

    • SSDEEP

      24576:XEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZJ:0fotP

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks