General

  • Target

    2025-02-01_a99b4f7b2c1824bbec9d201a4cc1a06b_mafia

  • Size

    10.2MB

  • Sample

    250201-zarxrs1kej

  • MD5

    a99b4f7b2c1824bbec9d201a4cc1a06b

  • SHA1

    74d7d6d6b6de6031080d3bebd89b31d74a2297f2

  • SHA256

    c70da94750371c2dcb1d02468a6ce3b05e6df1bc660a8133b082d9e7d0415e12

  • SHA512

    cd4e5ab0885e7c1e4d86ac1e3b96d93bbedda5a131e2b5731e3131a14502c9c5c9fbfaf3ab745efc5530b8b87145025f162b4c70e69a3153374a375e260bf6b4

  • SSDEEP

    49152:TqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:TqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_a99b4f7b2c1824bbec9d201a4cc1a06b_mafia

    • Size

      10.2MB

    • MD5

      a99b4f7b2c1824bbec9d201a4cc1a06b

    • SHA1

      74d7d6d6b6de6031080d3bebd89b31d74a2297f2

    • SHA256

      c70da94750371c2dcb1d02468a6ce3b05e6df1bc660a8133b082d9e7d0415e12

    • SHA512

      cd4e5ab0885e7c1e4d86ac1e3b96d93bbedda5a131e2b5731e3131a14502c9c5c9fbfaf3ab745efc5530b8b87145025f162b4c70e69a3153374a375e260bf6b4

    • SSDEEP

      49152:TqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:TqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.