General

  • Target

    2025-02-01_3a111ee619f6a58cdc11ab560fff69d1_mafia

  • Size

    11.7MB

  • Sample

    250201-yvbkvaxrdy

  • MD5

    3a111ee619f6a58cdc11ab560fff69d1

  • SHA1

    0c6e0e60066de6af7270bd69573a0d83a87e2213

  • SHA256

    ef731a26e3d02e193589c3cfd4964d3d37d8c043a7f1d72e35ccfa676d34755f

  • SHA512

    a4069662db0e481f809e64f5f2b92b424910f5e4e17901a65b89e3da3aaf660998f5bbd0368b2fd4d6c4cb283b56f2a7f3597fe4aa17ce82c39ec5f644f29df5

  • SSDEEP

    6144:LLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQt:ATYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_3a111ee619f6a58cdc11ab560fff69d1_mafia

    • Size

      11.7MB

    • MD5

      3a111ee619f6a58cdc11ab560fff69d1

    • SHA1

      0c6e0e60066de6af7270bd69573a0d83a87e2213

    • SHA256

      ef731a26e3d02e193589c3cfd4964d3d37d8c043a7f1d72e35ccfa676d34755f

    • SHA512

      a4069662db0e481f809e64f5f2b92b424910f5e4e17901a65b89e3da3aaf660998f5bbd0368b2fd4d6c4cb283b56f2a7f3597fe4aa17ce82c39ec5f644f29df5

    • SSDEEP

      6144:LLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQt:ATYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks