General

  • Target

    2025-02-01_9fdfe9888a658a5c32023f56eb4a1daf_mafia

  • Size

    10.3MB

  • Sample

    250201-y9gemsypet

  • MD5

    9fdfe9888a658a5c32023f56eb4a1daf

  • SHA1

    c35594f8fa42629e33c74c5a7a52ea5224d98ffc

  • SHA256

    2c1daf4538b0fce4b51d1110d91ad7f24f900fe91d93f5d166c9e00ca4236faf

  • SHA512

    c63fd406f45d1b5d9b9caeecc17b0877eba1f5450327c207a526de7204818fa07498bee684633bfe95ddb13cddde62e8376d79915dfcc5abc73a188066748249

  • SSDEEP

    24576:tEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZL:Wfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_9fdfe9888a658a5c32023f56eb4a1daf_mafia

    • Size

      10.3MB

    • MD5

      9fdfe9888a658a5c32023f56eb4a1daf

    • SHA1

      c35594f8fa42629e33c74c5a7a52ea5224d98ffc

    • SHA256

      2c1daf4538b0fce4b51d1110d91ad7f24f900fe91d93f5d166c9e00ca4236faf

    • SHA512

      c63fd406f45d1b5d9b9caeecc17b0877eba1f5450327c207a526de7204818fa07498bee684633bfe95ddb13cddde62e8376d79915dfcc5abc73a188066748249

    • SSDEEP

      24576:tEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZL:Wfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.