General

  • Target

    2025-01-31_877c136c5b3187fdb39b619b352113bb_mafia

  • Size

    11.8MB

  • Sample

    250131-gl5nws1lcr

  • MD5

    877c136c5b3187fdb39b619b352113bb

  • SHA1

    8f012b1a114be7b9642a3c1d79b6149eeaf63c46

  • SHA256

    12b1109b821b9695c766fa4413d64c46b537917dee1f1afb2a75ab6846b642c4

  • SHA512

    6b54e2fafb13f43836b6e911eefceab89836ed939443bb3af3cf505d14212e91c83b871aee0ce00941e28f189dbff46abf832b1a84558e043e16a5f547805aee

  • SSDEEP

    49152:JqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:JqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_877c136c5b3187fdb39b619b352113bb_mafia

    • Size

      11.8MB

    • MD5

      877c136c5b3187fdb39b619b352113bb

    • SHA1

      8f012b1a114be7b9642a3c1d79b6149eeaf63c46

    • SHA256

      12b1109b821b9695c766fa4413d64c46b537917dee1f1afb2a75ab6846b642c4

    • SHA512

      6b54e2fafb13f43836b6e911eefceab89836ed939443bb3af3cf505d14212e91c83b871aee0ce00941e28f189dbff46abf832b1a84558e043e16a5f547805aee

    • SSDEEP

      49152:JqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:JqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks