General

  • Target

    2025-01-31_d466384f3c12b6a938536e4d09958985_mafia

  • Size

    12.0MB

  • Sample

    250131-kn35matjan

  • MD5

    d466384f3c12b6a938536e4d09958985

  • SHA1

    3587acbef84035751f5352a3d7578e6a95aed729

  • SHA256

    a6f313cfcd3964b6f94c68783a1be75d85b28080b7cdc7a930acbe222573ff65

  • SHA512

    e99798157fec46c5a4e00fea225d91c47cb5c422523a2b44a0c7a484de2744c6cd7a9505276a82247c343e4b4f3355ab74c3526648cd1b872b8d86c917d576b9

  • SSDEEP

    3072:vLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:mOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_d466384f3c12b6a938536e4d09958985_mafia

    • Size

      12.0MB

    • MD5

      d466384f3c12b6a938536e4d09958985

    • SHA1

      3587acbef84035751f5352a3d7578e6a95aed729

    • SHA256

      a6f313cfcd3964b6f94c68783a1be75d85b28080b7cdc7a930acbe222573ff65

    • SHA512

      e99798157fec46c5a4e00fea225d91c47cb5c422523a2b44a0c7a484de2744c6cd7a9505276a82247c343e4b4f3355ab74c3526648cd1b872b8d86c917d576b9

    • SSDEEP

      3072:vLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:mOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks