General

  • Target

    2025-02-01_7ee3b912e1f5a5e3522f1852c0ae22f3_mafia

  • Size

    11.7MB

  • Sample

    250201-n97aystkfm

  • MD5

    7ee3b912e1f5a5e3522f1852c0ae22f3

  • SHA1

    c984f0f5ce389d3fa971a989a4e8bf99ecb9f7a6

  • SHA256

    1353256ab0a8e7ec45d22c075cdf413dffd5c945297aca835b604add7f29d817

  • SHA512

    7ee8dd8186ce83726ede8028bf450b4d87a489ce7cd45a5d963f97517bfa102abf4850d35b33c2a346698f78108fc11ad6a0f2777697fa7294e51a4d28a58c80

  • SSDEEP

    196608:NyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXO:YXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX+

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_7ee3b912e1f5a5e3522f1852c0ae22f3_mafia

    • Size

      11.7MB

    • MD5

      7ee3b912e1f5a5e3522f1852c0ae22f3

    • SHA1

      c984f0f5ce389d3fa971a989a4e8bf99ecb9f7a6

    • SHA256

      1353256ab0a8e7ec45d22c075cdf413dffd5c945297aca835b604add7f29d817

    • SHA512

      7ee8dd8186ce83726ede8028bf450b4d87a489ce7cd45a5d963f97517bfa102abf4850d35b33c2a346698f78108fc11ad6a0f2777697fa7294e51a4d28a58c80

    • SSDEEP

      196608:NyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXO:YXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks