General

  • Target

    2025-02-01_5e15ab1ff2fd29ddfd090e5a675e8569_mafia

  • Size

    13.1MB

  • Sample

    250201-x38d4syjgj

  • MD5

    5e15ab1ff2fd29ddfd090e5a675e8569

  • SHA1

    54053e5403871decfe48fab22f77a41bcdcb168e

  • SHA256

    df262ac57db73e286fb2c5e2f9565c948ced4ef7a078b79fb58a566f9bde381d

  • SHA512

    d9aae32da5d99086fdcf48bfbe449f53afe08bf49d5ba1e4ad63feb1635c168e8bbbf1e4f0c54f76deba7d293c22854eef9309d4c2be4ebf0b8a71b15673cf67

  • SSDEEP

    393216:JXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_5e15ab1ff2fd29ddfd090e5a675e8569_mafia

    • Size

      13.1MB

    • MD5

      5e15ab1ff2fd29ddfd090e5a675e8569

    • SHA1

      54053e5403871decfe48fab22f77a41bcdcb168e

    • SHA256

      df262ac57db73e286fb2c5e2f9565c948ced4ef7a078b79fb58a566f9bde381d

    • SHA512

      d9aae32da5d99086fdcf48bfbe449f53afe08bf49d5ba1e4ad63feb1635c168e8bbbf1e4f0c54f76deba7d293c22854eef9309d4c2be4ebf0b8a71b15673cf67

    • SSDEEP

      393216:JXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks