General

  • Target

    2025-02-01_4395d1bbc05ca36dccb62e2484276394_mafia

  • Size

    11.2MB

  • Sample

    250201-ywt4kszmfm

  • MD5

    4395d1bbc05ca36dccb62e2484276394

  • SHA1

    2528c32df15e7d76e77bf836a6c4e76511bcfa9b

  • SHA256

    9fc0dbdf5dccc389e47958cb38df30d6690ee4e06e8deec63ead62ddb273776f

  • SHA512

    f8b4b76eda8a1d9f1c1e6bb0b4ba7098e0183165489e97ffe980496c6bcb833cb93e39a7e0eb33dece0e3709843784be1841c987a4c5c4df042caf523a30b694

  • SSDEEP

    24576:sEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:pfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_4395d1bbc05ca36dccb62e2484276394_mafia

    • Size

      11.2MB

    • MD5

      4395d1bbc05ca36dccb62e2484276394

    • SHA1

      2528c32df15e7d76e77bf836a6c4e76511bcfa9b

    • SHA256

      9fc0dbdf5dccc389e47958cb38df30d6690ee4e06e8deec63ead62ddb273776f

    • SHA512

      f8b4b76eda8a1d9f1c1e6bb0b4ba7098e0183165489e97ffe980496c6bcb833cb93e39a7e0eb33dece0e3709843784be1841c987a4c5c4df042caf523a30b694

    • SSDEEP

      24576:sEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:pfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks