General

  • Target

    2025-01-31_e0de00f01e31c5e73f38e0c3eb046d90_mafia

  • Size

    12.3MB

  • Sample

    250131-ykjhpsxmfp

  • MD5

    e0de00f01e31c5e73f38e0c3eb046d90

  • SHA1

    6a8d03c22aba12d3c9d52cf45daf916f18def6bb

  • SHA256

    2898764fe5c352ebc70cab100fe6c8bcae7b783ebece8a55a34dc008c612bfcc

  • SHA512

    90615cc5d3fc75902edbe2236c1af713501c351d233b2a50237adb6f7aecd26086f87a92e7776f211bfc6016a81659bde7984dde28bfa521d80bd24d306f03fd

  • SSDEEP

    24576:BEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZn:afot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_e0de00f01e31c5e73f38e0c3eb046d90_mafia

    • Size

      12.3MB

    • MD5

      e0de00f01e31c5e73f38e0c3eb046d90

    • SHA1

      6a8d03c22aba12d3c9d52cf45daf916f18def6bb

    • SHA256

      2898764fe5c352ebc70cab100fe6c8bcae7b783ebece8a55a34dc008c612bfcc

    • SHA512

      90615cc5d3fc75902edbe2236c1af713501c351d233b2a50237adb6f7aecd26086f87a92e7776f211bfc6016a81659bde7984dde28bfa521d80bd24d306f03fd

    • SSDEEP

      24576:BEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZn:afot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.