General

  • Target

    2025-02-01_1a047daff0e921593e326997912f54c3_mafia

  • Size

    14.5MB

  • Sample

    250201-ym4xesxmhy

  • MD5

    1a047daff0e921593e326997912f54c3

  • SHA1

    dafe70cbcda2cf2ac5604b2012e35736e71d50c3

  • SHA256

    5872b45919be05e0cbfcc6937b2b61995edb68686cf32fe7fd10a961f1ec0506

  • SHA512

    0a6acb0e0bcda3a340791b6cadbdb02a5b8019b5f104ab424dcb61054969ba11ee7b88d1f450062065c2e21f08919b6a703c57b1ba9ba1ce305db9dda14d6dd3

  • SSDEEP

    393216:8XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_1a047daff0e921593e326997912f54c3_mafia

    • Size

      14.5MB

    • MD5

      1a047daff0e921593e326997912f54c3

    • SHA1

      dafe70cbcda2cf2ac5604b2012e35736e71d50c3

    • SHA256

      5872b45919be05e0cbfcc6937b2b61995edb68686cf32fe7fd10a961f1ec0506

    • SHA512

      0a6acb0e0bcda3a340791b6cadbdb02a5b8019b5f104ab424dcb61054969ba11ee7b88d1f450062065c2e21f08919b6a703c57b1ba9ba1ce305db9dda14d6dd3

    • SSDEEP

      393216:8XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks