General

  • Target

    2025-01-31_cee37bed4dbbc6b359a589ec21fafc18_mafia

  • Size

    10.5MB

  • Sample

    250131-gavdsa1kdn

  • MD5

    cee37bed4dbbc6b359a589ec21fafc18

  • SHA1

    9c201c7b568ff9804f1124c3d8aca6b06ba782a9

  • SHA256

    6dd7abd54fb8d4a331fca9e51b59d045b5ff3b0bd5da50eafe3e77be3e7829af

  • SHA512

    6833150a1e887358c520eeb53cb48160f88e02a3482798876033ba811bd8e3a23421304be46275ebe38d5b940d2d2b6da4c0f729fd7465b4a98ccc61fd496c40

  • SSDEEP

    196608:ZyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX1:UXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXl

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_cee37bed4dbbc6b359a589ec21fafc18_mafia

    • Size

      10.5MB

    • MD5

      cee37bed4dbbc6b359a589ec21fafc18

    • SHA1

      9c201c7b568ff9804f1124c3d8aca6b06ba782a9

    • SHA256

      6dd7abd54fb8d4a331fca9e51b59d045b5ff3b0bd5da50eafe3e77be3e7829af

    • SHA512

      6833150a1e887358c520eeb53cb48160f88e02a3482798876033ba811bd8e3a23421304be46275ebe38d5b940d2d2b6da4c0f729fd7465b4a98ccc61fd496c40

    • SSDEEP

      196608:ZyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX1:UXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks