General

  • Target

    2025-01-31_064ff886ce1dfae017a3a8ffd297c74d_mafia

  • Size

    10.9MB

  • Sample

    250131-yhqh8svnf1

  • MD5

    064ff886ce1dfae017a3a8ffd297c74d

  • SHA1

    93a9531d32673ebeb3f9adc54aebe0caa6ce9ecc

  • SHA256

    5f51d30f289b1a454e24a69f7b6bedbe46feac7777fb99b903edcb0e12064ff4

  • SHA512

    0da174a798c099d9e03ddd4b6a015c37ae013aa18dc6c6327153fea8f9a551b8f44d7a3fd7d89ccdee1be333c68c079b1349bcfd13e5dff38b898336e493458a

  • SSDEEP

    49152:/qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:/qtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_064ff886ce1dfae017a3a8ffd297c74d_mafia

    • Size

      10.9MB

    • MD5

      064ff886ce1dfae017a3a8ffd297c74d

    • SHA1

      93a9531d32673ebeb3f9adc54aebe0caa6ce9ecc

    • SHA256

      5f51d30f289b1a454e24a69f7b6bedbe46feac7777fb99b903edcb0e12064ff4

    • SHA512

      0da174a798c099d9e03ddd4b6a015c37ae013aa18dc6c6327153fea8f9a551b8f44d7a3fd7d89ccdee1be333c68c079b1349bcfd13e5dff38b898336e493458a

    • SSDEEP

      49152:/qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:/qtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks