General

  • Target

    2025-02-01_02c73729047592a348db8fc95b47ac76_mafia

  • Size

    13.5MB

  • Sample

    250201-yh6v8axldz

  • MD5

    02c73729047592a348db8fc95b47ac76

  • SHA1

    005b6c07b0dab2aa80cb7bc7159760a822d0b711

  • SHA256

    eb4879004ba0ee82d332672f71c085ad7b461d6519e1c59647fc34f03b1c95e8

  • SHA512

    65aa1132ba80ba5a30a11a4d83f22787285d5c643a637bec0c0b2def7cb4ec78c402fda4380f33a2f5f540c36d10a8af17b463f115447c4f0c5c6012562993d6

  • SSDEEP

    49152:BqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:BqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_02c73729047592a348db8fc95b47ac76_mafia

    • Size

      13.5MB

    • MD5

      02c73729047592a348db8fc95b47ac76

    • SHA1

      005b6c07b0dab2aa80cb7bc7159760a822d0b711

    • SHA256

      eb4879004ba0ee82d332672f71c085ad7b461d6519e1c59647fc34f03b1c95e8

    • SHA512

      65aa1132ba80ba5a30a11a4d83f22787285d5c643a637bec0c0b2def7cb4ec78c402fda4380f33a2f5f540c36d10a8af17b463f115447c4f0c5c6012562993d6

    • SSDEEP

      49152:BqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:BqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks