General

  • Target

    2025-02-01_6df18a8d2707d7eb2d912e8fb6391b11_mafia

  • Size

    13.5MB

  • Sample

    250201-y2ek3sylbz

  • MD5

    6df18a8d2707d7eb2d912e8fb6391b11

  • SHA1

    82c745888941614f23554b0b36d0d4e9054188b5

  • SHA256

    0bc64c4228a8a04bc7e86cbe66739cd23a4125fc9b732fcf4c9d71c645343006

  • SHA512

    91a61750cf0c279c02963f22bf637738c3d6d0113a0d73b14f346e059315edc16c046ee28f1eb016d88aca8da3a73c64413f30cb3fd472dd3f12976a99e1b560

  • SSDEEP

    24576:mEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ9:ffot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_6df18a8d2707d7eb2d912e8fb6391b11_mafia

    • Size

      13.5MB

    • MD5

      6df18a8d2707d7eb2d912e8fb6391b11

    • SHA1

      82c745888941614f23554b0b36d0d4e9054188b5

    • SHA256

      0bc64c4228a8a04bc7e86cbe66739cd23a4125fc9b732fcf4c9d71c645343006

    • SHA512

      91a61750cf0c279c02963f22bf637738c3d6d0113a0d73b14f346e059315edc16c046ee28f1eb016d88aca8da3a73c64413f30cb3fd472dd3f12976a99e1b560

    • SSDEEP

      24576:mEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ9:ffot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks