General

  • Target

    2025-02-01_04e437967a97228b8a21dc2a0c069a00_mafia

  • Size

    10.4MB

  • Sample

    250201-fbpz1ssla1

  • MD5

    04e437967a97228b8a21dc2a0c069a00

  • SHA1

    3636d55251c0953be05d9f02897352f7f43f7a9f

  • SHA256

    2be71100003ab6289fedc5f0fe8bd605020c56ad24e4a3d1aad58634b2c259b9

  • SHA512

    4729d9fc7c432805ba60d98ffafe2663f4f92ae84e18291e001fe783148c22ec6692bfd747f6520e8c4837cd23d353780fef6200dad8152d2f4243c43084c59c

  • SSDEEP

    24576:IEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZS:FfotA

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_04e437967a97228b8a21dc2a0c069a00_mafia

    • Size

      10.4MB

    • MD5

      04e437967a97228b8a21dc2a0c069a00

    • SHA1

      3636d55251c0953be05d9f02897352f7f43f7a9f

    • SHA256

      2be71100003ab6289fedc5f0fe8bd605020c56ad24e4a3d1aad58634b2c259b9

    • SHA512

      4729d9fc7c432805ba60d98ffafe2663f4f92ae84e18291e001fe783148c22ec6692bfd747f6520e8c4837cd23d353780fef6200dad8152d2f4243c43084c59c

    • SSDEEP

      24576:IEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZS:FfotA

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks