General

  • Target

    2025-02-01_883021a16023250914bf6e596896bc2b_mafia

  • Size

    12.3MB

  • Sample

    250201-y5p6zszqgm

  • MD5

    883021a16023250914bf6e596896bc2b

  • SHA1

    e450db5b3594990d2655a2cac96a412f7138723c

  • SHA256

    490bc8f75eabcae07ac5e9fa5ed53ffcbad759f14ac911066e797e31484e34aa

  • SHA512

    34fd89169b0ec202f7460d41cb29c9ed70a238c8c920b72b24368260df116b38708eace1d235f0c6ad19a9f3699f9f46d104a51deca1a93550c0dd51f6df05c9

  • SSDEEP

    3072:FLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:oOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_883021a16023250914bf6e596896bc2b_mafia

    • Size

      12.3MB

    • MD5

      883021a16023250914bf6e596896bc2b

    • SHA1

      e450db5b3594990d2655a2cac96a412f7138723c

    • SHA256

      490bc8f75eabcae07ac5e9fa5ed53ffcbad759f14ac911066e797e31484e34aa

    • SHA512

      34fd89169b0ec202f7460d41cb29c9ed70a238c8c920b72b24368260df116b38708eace1d235f0c6ad19a9f3699f9f46d104a51deca1a93550c0dd51f6df05c9

    • SSDEEP

      3072:FLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:oOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks