General

  • Target

    2025-02-01_3c2bc3d86ab2c59bb8db6437b7ecd18f_mafia

  • Size

    13.7MB

  • Sample

    250201-yvv99azmbn

  • MD5

    3c2bc3d86ab2c59bb8db6437b7ecd18f

  • SHA1

    c6eac3932bca6f8e34a5a055c24f2d567b14f7b0

  • SHA256

    6ba765a740a33a897e20816576017b80d636ee49a108edeb56555351012c5e2b

  • SHA512

    b4cff121925a952ef420e3a9a95d93360198773960ee4dc865f0a569868638f2d71e2eadbc53694d0084728d31e2b53a635c2db13c884e0845d98976ed9989d7

  • SSDEEP

    24576:8EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:5fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_3c2bc3d86ab2c59bb8db6437b7ecd18f_mafia

    • Size

      13.7MB

    • MD5

      3c2bc3d86ab2c59bb8db6437b7ecd18f

    • SHA1

      c6eac3932bca6f8e34a5a055c24f2d567b14f7b0

    • SHA256

      6ba765a740a33a897e20816576017b80d636ee49a108edeb56555351012c5e2b

    • SHA512

      b4cff121925a952ef420e3a9a95d93360198773960ee4dc865f0a569868638f2d71e2eadbc53694d0084728d31e2b53a635c2db13c884e0845d98976ed9989d7

    • SSDEEP

      24576:8EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:5fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks