General

  • Target

    2025-02-01_597213a233ba1f103cba7afe8a9ee954_mafia

  • Size

    12.0MB

  • Sample

    250201-yy4e2azngn

  • MD5

    597213a233ba1f103cba7afe8a9ee954

  • SHA1

    aa2badaef6ad4908017e7b9b3fc5fd6546686276

  • SHA256

    42e366216794d9dca4bc36db97439b10c8062b1142d943e87c78a946e2220074

  • SHA512

    8b0d964efb4f73db66a1907c32f8ff370e1789c0c9a905fdcd9b46cbf87082fb9aae77d7b0fb62a7420636eedc6e05511c1619cc8915a02a1ce25ec7f88b7e02

  • SSDEEP

    24576:6EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZB:Tfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_597213a233ba1f103cba7afe8a9ee954_mafia

    • Size

      12.0MB

    • MD5

      597213a233ba1f103cba7afe8a9ee954

    • SHA1

      aa2badaef6ad4908017e7b9b3fc5fd6546686276

    • SHA256

      42e366216794d9dca4bc36db97439b10c8062b1142d943e87c78a946e2220074

    • SHA512

      8b0d964efb4f73db66a1907c32f8ff370e1789c0c9a905fdcd9b46cbf87082fb9aae77d7b0fb62a7420636eedc6e05511c1619cc8915a02a1ce25ec7f88b7e02

    • SSDEEP

      24576:6EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZB:Tfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.