General

  • Target

    2025-01-31_0e117629bea7310213e5299e6d8522f7_mafia

  • Size

    14.5MB

  • Sample

    250131-x7n62axjcq

  • MD5

    0e117629bea7310213e5299e6d8522f7

  • SHA1

    3d7d2008bd81f8714c1af2954ac7586e0fb87023

  • SHA256

    30ecd6f613c2259348422d6167f34c01a5374d978d512b84f2a64e94d1b10d8e

  • SHA512

    b136cba73db8d878ee01528117519371d55c284e592d025f6b3e05b8589fa2e5ba9568d8711fc28182c4575b23629470eeee4143b9edd385dc77f93a13f53a69

  • SSDEEP

    24576:bpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttf:too

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_0e117629bea7310213e5299e6d8522f7_mafia

    • Size

      14.5MB

    • MD5

      0e117629bea7310213e5299e6d8522f7

    • SHA1

      3d7d2008bd81f8714c1af2954ac7586e0fb87023

    • SHA256

      30ecd6f613c2259348422d6167f34c01a5374d978d512b84f2a64e94d1b10d8e

    • SHA512

      b136cba73db8d878ee01528117519371d55c284e592d025f6b3e05b8589fa2e5ba9568d8711fc28182c4575b23629470eeee4143b9edd385dc77f93a13f53a69

    • SSDEEP

      24576:bpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttf:too

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks