General

  • Target

    2025-02-01_bdfff05dd7ad370dd82adf8c9fd8bc94_mafia

  • Size

    14.3MB

  • Sample

    250201-zdgk7syra1

  • MD5

    bdfff05dd7ad370dd82adf8c9fd8bc94

  • SHA1

    2b4a6cef5342cdc9925bd36acecb2e0ba55be21b

  • SHA256

    4691b2fd4ae32c2e070e45a44ddf3ffe2a75df9c997c34fd8f0aaa8b25911305

  • SHA512

    55a6fedebea9b742eef125823381d201606566571cea225ccc5ea1bbbc5c74655a330303ec63ac8bdbdf0355ecbbfe1e11c9640f411b7a2aea96a0baf5fb7629

  • SSDEEP

    49152:hqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:hqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_bdfff05dd7ad370dd82adf8c9fd8bc94_mafia

    • Size

      14.3MB

    • MD5

      bdfff05dd7ad370dd82adf8c9fd8bc94

    • SHA1

      2b4a6cef5342cdc9925bd36acecb2e0ba55be21b

    • SHA256

      4691b2fd4ae32c2e070e45a44ddf3ffe2a75df9c997c34fd8f0aaa8b25911305

    • SHA512

      55a6fedebea9b742eef125823381d201606566571cea225ccc5ea1bbbc5c74655a330303ec63ac8bdbdf0355ecbbfe1e11c9640f411b7a2aea96a0baf5fb7629

    • SSDEEP

      49152:hqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:hqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks