General

  • Target

    2025-02-01_28a46a2947017a0a320d20e5f9305286_mafia

  • Size

    11.7MB

  • Sample

    250201-yqsnkaxpet

  • MD5

    28a46a2947017a0a320d20e5f9305286

  • SHA1

    f7c5eed53f17949d494de2fa64cf0d27341c4876

  • SHA256

    2e612115667e2fe1c19c2b791593855ef50b32dc19d0dfff5dae132baacfa02c

  • SHA512

    f9fe32b1d60ab5c7cdf547a188afab4ef5b357f10e37342f36d5e52f939bc708a4c7804f6426eb550a757cfc5d069cc1ced029b02df88f77fb493225fc4c8e46

  • SSDEEP

    196608:jyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_28a46a2947017a0a320d20e5f9305286_mafia

    • Size

      11.7MB

    • MD5

      28a46a2947017a0a320d20e5f9305286

    • SHA1

      f7c5eed53f17949d494de2fa64cf0d27341c4876

    • SHA256

      2e612115667e2fe1c19c2b791593855ef50b32dc19d0dfff5dae132baacfa02c

    • SHA512

      f9fe32b1d60ab5c7cdf547a188afab4ef5b357f10e37342f36d5e52f939bc708a4c7804f6426eb550a757cfc5d069cc1ced029b02df88f77fb493225fc4c8e46

    • SSDEEP

      196608:jyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks