General

  • Target

    2025-01-31_7c45c2796d672fd762b2cd8d2106fc1a_mafia

  • Size

    12.5MB

  • Sample

    250131-ydt1vsxkgn

  • MD5

    7c45c2796d672fd762b2cd8d2106fc1a

  • SHA1

    18118dc4da33f4712324a61472b80737d5222f58

  • SHA256

    202dd7832900986abb5e8ccbaca0e676c09c46b2d06ecb9ab357cb353abb1569

  • SHA512

    654c8c7144ca5c5e7399dc62b833ed32a3a7087bca41fa878810f68646c69fa71eab24061d7a1b90b3ce793f9e46eed231f77e342aa14bb04cd09e21f6e50ac0

  • SSDEEP

    24576:MpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt/:ooo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_7c45c2796d672fd762b2cd8d2106fc1a_mafia

    • Size

      12.5MB

    • MD5

      7c45c2796d672fd762b2cd8d2106fc1a

    • SHA1

      18118dc4da33f4712324a61472b80737d5222f58

    • SHA256

      202dd7832900986abb5e8ccbaca0e676c09c46b2d06ecb9ab357cb353abb1569

    • SHA512

      654c8c7144ca5c5e7399dc62b833ed32a3a7087bca41fa878810f68646c69fa71eab24061d7a1b90b3ce793f9e46eed231f77e342aa14bb04cd09e21f6e50ac0

    • SSDEEP

      24576:MpomTTN9ttttttttttttttttttttttttttttttttttttttttttttttttttttttt/:ooo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.