General

  • Target

    2025-02-01_5bc6501dcfa7c41b3c5541b68f54d94c_mafia

  • Size

    13.4MB

  • Sample

    250201-tgw76s1pdj

  • MD5

    5bc6501dcfa7c41b3c5541b68f54d94c

  • SHA1

    bb6f9e430e39820f33881920f144a4cc56171ee2

  • SHA256

    a70ba081e98ed55c64ec32bd490e1a9c2dc7b3c6c79a981345255afba7361c93

  • SHA512

    3dc0a4958c700fd24d261ca0a00aef1eb922ce7512b87d9cd68e6b7d45f2bbf73d4bf8c8f1ccaf6a6923d4a7de5aaca1cc469bdf3856a32889c0fff491f460c4

  • SSDEEP

    393216:kXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXx:m

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_5bc6501dcfa7c41b3c5541b68f54d94c_mafia

    • Size

      13.4MB

    • MD5

      5bc6501dcfa7c41b3c5541b68f54d94c

    • SHA1

      bb6f9e430e39820f33881920f144a4cc56171ee2

    • SHA256

      a70ba081e98ed55c64ec32bd490e1a9c2dc7b3c6c79a981345255afba7361c93

    • SHA512

      3dc0a4958c700fd24d261ca0a00aef1eb922ce7512b87d9cd68e6b7d45f2bbf73d4bf8c8f1ccaf6a6923d4a7de5aaca1cc469bdf3856a32889c0fff491f460c4

    • SSDEEP

      393216:kXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXx:m

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks