General

  • Target

    2025-02-01_84d420f021fcac98773615ee5ef02e16_mafia

  • Size

    10.4MB

  • Sample

    250201-y5fybaymex

  • MD5

    84d420f021fcac98773615ee5ef02e16

  • SHA1

    6026658871dfc560b5c8f4e63df9bd143a9e3148

  • SHA256

    34a44b3c1fe0d03bab32a58e994ce71b84e312911cf22704b94bd6e9dcea01ad

  • SHA512

    ba03146887876314d068ec2592a396f019e14ebaa173624b539e6daa38d462e5534f96dcacdd9920600733f0cf0ee3eff6149be38061af0d7b30c29f34d5728e

  • SSDEEP

    196608:AyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:VXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_84d420f021fcac98773615ee5ef02e16_mafia

    • Size

      10.4MB

    • MD5

      84d420f021fcac98773615ee5ef02e16

    • SHA1

      6026658871dfc560b5c8f4e63df9bd143a9e3148

    • SHA256

      34a44b3c1fe0d03bab32a58e994ce71b84e312911cf22704b94bd6e9dcea01ad

    • SHA512

      ba03146887876314d068ec2592a396f019e14ebaa173624b539e6daa38d462e5534f96dcacdd9920600733f0cf0ee3eff6149be38061af0d7b30c29f34d5728e

    • SSDEEP

      196608:AyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:VXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks