General

  • Target

    2025-02-01_cb0c931541e9fc73ac2847fa4222fe2b_mafia

  • Size

    11.6MB

  • Sample

    250201-zelljs1mcl

  • MD5

    cb0c931541e9fc73ac2847fa4222fe2b

  • SHA1

    186a9da1a462953f4cd10938c418d6c916b80ffa

  • SHA256

    21b70b9d34cc4456dea3c340c60e63e6af910ca6ceaab62694cea3ad558717bf

  • SHA512

    5a73ea10f5e0f62a8e463643fdc0a96883573b9719590df9b605e3c101fb3b0dba3c803002cff4bb967a54792ad7214a38b36ad80c794c1115c33122896c7917

  • SSDEEP

    3072:tLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:wOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_cb0c931541e9fc73ac2847fa4222fe2b_mafia

    • Size

      11.6MB

    • MD5

      cb0c931541e9fc73ac2847fa4222fe2b

    • SHA1

      186a9da1a462953f4cd10938c418d6c916b80ffa

    • SHA256

      21b70b9d34cc4456dea3c340c60e63e6af910ca6ceaab62694cea3ad558717bf

    • SHA512

      5a73ea10f5e0f62a8e463643fdc0a96883573b9719590df9b605e3c101fb3b0dba3c803002cff4bb967a54792ad7214a38b36ad80c794c1115c33122896c7917

    • SSDEEP

      3072:tLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:wOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks