General

  • Target

    2025-01-31_7173e94584deef221338f95381b817a7_mafia

  • Size

    12.6MB

  • Sample

    250131-yp7q4avras

  • MD5

    7173e94584deef221338f95381b817a7

  • SHA1

    85f9beddd1b83051d6dc08d0984a759788a0b62a

  • SHA256

    ffd384bd0cc0ba5d6955535fdd6bbdcb371b8a59ff6aeb9e59a835928fdf89d3

  • SHA512

    f8231006ea322b6d57f355cf2982d3a026626ed07ce36f92c9c29fc8cebf36c4ae1ae0ef649289cfae61968bf5723060df88f7fb14b7ac5cfa6ff948c0c6194c

  • SSDEEP

    393216:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-31_7173e94584deef221338f95381b817a7_mafia

    • Size

      12.6MB

    • MD5

      7173e94584deef221338f95381b817a7

    • SHA1

      85f9beddd1b83051d6dc08d0984a759788a0b62a

    • SHA256

      ffd384bd0cc0ba5d6955535fdd6bbdcb371b8a59ff6aeb9e59a835928fdf89d3

    • SHA512

      f8231006ea322b6d57f355cf2982d3a026626ed07ce36f92c9c29fc8cebf36c4ae1ae0ef649289cfae61968bf5723060df88f7fb14b7ac5cfa6ff948c0c6194c

    • SSDEEP

      393216:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks