General

  • Target

    2025-01-31_691538f9228fb8bdff33d93f22b3d9ad_mafia

  • Size

    11.0MB

  • Sample

    250131-t1wqrasraq

  • MD5

    691538f9228fb8bdff33d93f22b3d9ad

  • SHA1

    9567d6d79cfea0b287f7081c0676f82ddb7971d9

  • SHA256

    994e81fb5f54eb9e52df8df253dcdccc72d1392cedf8df90326ab0779df19524

  • SHA512

    6cecc83c562a06af8b77aa838f1a913c462737bcf4601e4def3c7e3bf1e8dacd5b46a89e3ee9ede7f49fd273b9fadebb8da248360426bd6cbbff555e85571084

  • SSDEEP

    24576:86WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQv:RWdLQkt

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_691538f9228fb8bdff33d93f22b3d9ad_mafia

    • Size

      11.0MB

    • MD5

      691538f9228fb8bdff33d93f22b3d9ad

    • SHA1

      9567d6d79cfea0b287f7081c0676f82ddb7971d9

    • SHA256

      994e81fb5f54eb9e52df8df253dcdccc72d1392cedf8df90326ab0779df19524

    • SHA512

      6cecc83c562a06af8b77aa838f1a913c462737bcf4601e4def3c7e3bf1e8dacd5b46a89e3ee9ede7f49fd273b9fadebb8da248360426bd6cbbff555e85571084

    • SSDEEP

      24576:86WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQv:RWdLQkt

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks