General

  • Target

    2025-02-01_686895e795eae2b68deabd35862ae94a_mafia

  • Size

    13.9MB

  • Sample

    250201-y14htaykhz

  • MD5

    686895e795eae2b68deabd35862ae94a

  • SHA1

    96f626d44d2cd042397da3e5b378d68b2fae5bc1

  • SHA256

    2f6a585609954a8cc41c2221cbe83bd13ae7e259e19a60d0b80922e748b8c258

  • SHA512

    3a5d8ef9206d4c693696d72ea4a95dc3fc1d5f2705576be3293de0b0baf376895c8e8c5e4a46e12925b2a91809e137ac3cfecdb6bcac7a39e76ee45efa5acb47

  • SSDEEP

    24576:8EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ5:5fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_686895e795eae2b68deabd35862ae94a_mafia

    • Size

      13.9MB

    • MD5

      686895e795eae2b68deabd35862ae94a

    • SHA1

      96f626d44d2cd042397da3e5b378d68b2fae5bc1

    • SHA256

      2f6a585609954a8cc41c2221cbe83bd13ae7e259e19a60d0b80922e748b8c258

    • SHA512

      3a5d8ef9206d4c693696d72ea4a95dc3fc1d5f2705576be3293de0b0baf376895c8e8c5e4a46e12925b2a91809e137ac3cfecdb6bcac7a39e76ee45efa5acb47

    • SSDEEP

      24576:8EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ5:5fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.