General

  • Target

    2025-02-01_0aa045fd7e868d2b897f7c7d49bd3da1_mafia

  • Size

    14.1MB

  • Sample

    250201-ykd8zsxlhv

  • MD5

    0aa045fd7e868d2b897f7c7d49bd3da1

  • SHA1

    3f32cac736e6fcc3ff4e9dbfbb2fabd1317d7fc2

  • SHA256

    432fa98f61def37c7834351b857e1775a33a94de164b7f94ec7320716daf0fa0

  • SHA512

    e25477ad497ccc470fd73a14d2212dad22c258f49e73b958baf0438b9e1b9e5f30027ce484dcb2534e582c9283a5bd8f2a2452786ea2a37ff0c56d8a2f7a9525

  • SSDEEP

    24576:dEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZP:Gfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_0aa045fd7e868d2b897f7c7d49bd3da1_mafia

    • Size

      14.1MB

    • MD5

      0aa045fd7e868d2b897f7c7d49bd3da1

    • SHA1

      3f32cac736e6fcc3ff4e9dbfbb2fabd1317d7fc2

    • SHA256

      432fa98f61def37c7834351b857e1775a33a94de164b7f94ec7320716daf0fa0

    • SHA512

      e25477ad497ccc470fd73a14d2212dad22c258f49e73b958baf0438b9e1b9e5f30027ce484dcb2534e582c9283a5bd8f2a2452786ea2a37ff0c56d8a2f7a9525

    • SSDEEP

      24576:dEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZP:Gfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks