General

  • Target

    2025-01-31_35d3b58bc47cf0fbbe92b17ef7c2a278_mafia

  • Size

    12.4MB

  • Sample

    250131-ylek5svpfw

  • MD5

    35d3b58bc47cf0fbbe92b17ef7c2a278

  • SHA1

    05093f1a1d9c8c53a92e08d297ef86dec093201c

  • SHA256

    75a857069aaef2b13e4faac2eaf67423fa9f58e65246dddbc075be0e140efc95

  • SHA512

    32d770ff08e03312aebbfa75ba9b797d26e7c7c692ab29966e206a1f5b42ac14fd32eac5f25fac0b8ee51ec49503444d0a25605694995ebc73880b37bcb92a6d

  • SSDEEP

    6144:bLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ4:wTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_35d3b58bc47cf0fbbe92b17ef7c2a278_mafia

    • Size

      12.4MB

    • MD5

      35d3b58bc47cf0fbbe92b17ef7c2a278

    • SHA1

      05093f1a1d9c8c53a92e08d297ef86dec093201c

    • SHA256

      75a857069aaef2b13e4faac2eaf67423fa9f58e65246dddbc075be0e140efc95

    • SHA512

      32d770ff08e03312aebbfa75ba9b797d26e7c7c692ab29966e206a1f5b42ac14fd32eac5f25fac0b8ee51ec49503444d0a25605694995ebc73880b37bcb92a6d

    • SSDEEP

      6144:bLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ4:wTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks