General

  • Target

    2025-01-31_047c998fb134b08e332826053fa8640f_mafia

  • Size

    14.7MB

  • Sample

    250131-yj5dsavpbx

  • MD5

    047c998fb134b08e332826053fa8640f

  • SHA1

    b69f1fe444fb5c2fd2983c17e91607be66453376

  • SHA256

    77728ab8b44b23e25a625458f8750a51feb298c7af0bf2c0d619fbd78b56f6f8

  • SHA512

    120e7c55a728c4b55689ed8a87ba6f0e1cbc537ba17328481a013284afaae63c6593815ccd9f226723ea5168e0b62bb93270b64de9927e91bcca5a7c869f513f

  • SSDEEP

    393216:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_047c998fb134b08e332826053fa8640f_mafia

    • Size

      14.7MB

    • MD5

      047c998fb134b08e332826053fa8640f

    • SHA1

      b69f1fe444fb5c2fd2983c17e91607be66453376

    • SHA256

      77728ab8b44b23e25a625458f8750a51feb298c7af0bf2c0d619fbd78b56f6f8

    • SHA512

      120e7c55a728c4b55689ed8a87ba6f0e1cbc537ba17328481a013284afaae63c6593815ccd9f226723ea5168e0b62bb93270b64de9927e91bcca5a7c869f513f

    • SSDEEP

      393216:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.