General

  • Target

    2025-02-01_25e8359afd9a9eb6d9a9603edddefff7_mafia

  • Size

    11.9MB

  • Sample

    250201-yp8cmaxpbv

  • MD5

    25e8359afd9a9eb6d9a9603edddefff7

  • SHA1

    e4f348fd6d7bafdd58715d4310f79c4aab2374b6

  • SHA256

    4eafa00d707062e8b6e1769d99ac329773c06680c86e1cbeb121dbd94a779b01

  • SHA512

    8d92e295423aaf3271bdcce48d1e7d61eb2d2559a93fd855ac025f6eb0e0d9f20fc6e9b5ad90843c5b94a7af23509a23072a0d40edd1938c1b7ca526452c7604

  • SSDEEP

    3072:zLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:6OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_25e8359afd9a9eb6d9a9603edddefff7_mafia

    • Size

      11.9MB

    • MD5

      25e8359afd9a9eb6d9a9603edddefff7

    • SHA1

      e4f348fd6d7bafdd58715d4310f79c4aab2374b6

    • SHA256

      4eafa00d707062e8b6e1769d99ac329773c06680c86e1cbeb121dbd94a779b01

    • SHA512

      8d92e295423aaf3271bdcce48d1e7d61eb2d2559a93fd855ac025f6eb0e0d9f20fc6e9b5ad90843c5b94a7af23509a23072a0d40edd1938c1b7ca526452c7604

    • SSDEEP

      3072:zLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:6OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks