General

  • Target

    2025-01-31_60c5a5e092b4cf3d120e3592142e6288_mafia

  • Size

    13.8MB

  • Sample

    250131-yd923svmgw

  • MD5

    60c5a5e092b4cf3d120e3592142e6288

  • SHA1

    e72d477b6c9e5ae53501b6ff712938245d0d444b

  • SHA256

    387da9f1c0db0a113e160f090cc338a0a0287185142260611399b23f0b7b3fa6

  • SHA512

    a1f6092002d96ded9a11bf767dcd780945f9214e0519d323f9c703a6764fa8d51a6d78cffe066709423800c547301a856112f89723739cb4033d66adc77d2608

  • SSDEEP

    393216:2XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_60c5a5e092b4cf3d120e3592142e6288_mafia

    • Size

      13.8MB

    • MD5

      60c5a5e092b4cf3d120e3592142e6288

    • SHA1

      e72d477b6c9e5ae53501b6ff712938245d0d444b

    • SHA256

      387da9f1c0db0a113e160f090cc338a0a0287185142260611399b23f0b7b3fa6

    • SHA512

      a1f6092002d96ded9a11bf767dcd780945f9214e0519d323f9c703a6764fa8d51a6d78cffe066709423800c547301a856112f89723739cb4033d66adc77d2608

    • SSDEEP

      393216:2XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks