General

  • Target

    2025-02-01_f5e8a3e5494dfcbafdcf2a18079fa6f6_mafia

  • Size

    13.7MB

  • Sample

    250201-n8wststkbj

  • MD5

    f5e8a3e5494dfcbafdcf2a18079fa6f6

  • SHA1

    2985d8cbcf0c7d4b5a92564c575e63076534f2ce

  • SHA256

    1a190de18ea4ddfdf00ab2adf7512ca8a655c54dcf1587ceb3074a02f71fde0a

  • SHA512

    25bebbcb1c3444773a0ff34a59e0ac377a7989d4ccd81a41ce0d7e97864cbe963247935997c388a3169adef8c19239e0189d8e2830361e7601507f2b41f7d498

  • SSDEEP

    49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP4:9qtYc3f

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_f5e8a3e5494dfcbafdcf2a18079fa6f6_mafia

    • Size

      13.7MB

    • MD5

      f5e8a3e5494dfcbafdcf2a18079fa6f6

    • SHA1

      2985d8cbcf0c7d4b5a92564c575e63076534f2ce

    • SHA256

      1a190de18ea4ddfdf00ab2adf7512ca8a655c54dcf1587ceb3074a02f71fde0a

    • SHA512

      25bebbcb1c3444773a0ff34a59e0ac377a7989d4ccd81a41ce0d7e97864cbe963247935997c388a3169adef8c19239e0189d8e2830361e7601507f2b41f7d498

    • SSDEEP

      49152:9qE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP4:9qtYc3f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks