General

  • Target

    2025-01-31_b0fd4e430712651728eeef94f1698a34_mafia

  • Size

    11.7MB

  • Sample

    250131-t1q59ssran

  • MD5

    b0fd4e430712651728eeef94f1698a34

  • SHA1

    e7dc567b45b5aec4a0bf1e9b3377a12ce7456c43

  • SHA256

    8bd75372f704a8b6eebf3187b250c7a1bd885760d47b9191a4603b08645dc59b

  • SHA512

    695dd9016b2c2e7d092f23489988c7ae06986fd6423abd4314c2048754b22ee9fc830560e461d25cb61f4708f98d1d6f19322ea74b529eb849b2e223273ee314

  • SSDEEP

    24576:06WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQp:ZWdLQkH

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_b0fd4e430712651728eeef94f1698a34_mafia

    • Size

      11.7MB

    • MD5

      b0fd4e430712651728eeef94f1698a34

    • SHA1

      e7dc567b45b5aec4a0bf1e9b3377a12ce7456c43

    • SHA256

      8bd75372f704a8b6eebf3187b250c7a1bd885760d47b9191a4603b08645dc59b

    • SHA512

      695dd9016b2c2e7d092f23489988c7ae06986fd6423abd4314c2048754b22ee9fc830560e461d25cb61f4708f98d1d6f19322ea74b529eb849b2e223273ee314

    • SSDEEP

      24576:06WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQp:ZWdLQkH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks