General

  • Target

    2025-02-01_e1c8958be6648c3d226e6394171b0b67_mafia

  • Size

    12.9MB

  • Sample

    250201-zhxg8azka1

  • MD5

    e1c8958be6648c3d226e6394171b0b67

  • SHA1

    bf0f9d9825b7e2a78398e184d1ac9ae0cc12dbc6

  • SHA256

    64e213038d35523da1a3c734a9a7d165d199ad9c43a2c06e6394702f9589ec65

  • SHA512

    d6938b658fbc445e05329448a9c767047699fc46152285d8f25fb83e0e11e2b6614d8fc176f3ebcf54b90f251b14516e3725282cabfacd6628bf1d470920b5c3

  • SSDEEP

    24576:0EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:Rfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_e1c8958be6648c3d226e6394171b0b67_mafia

    • Size

      12.9MB

    • MD5

      e1c8958be6648c3d226e6394171b0b67

    • SHA1

      bf0f9d9825b7e2a78398e184d1ac9ae0cc12dbc6

    • SHA256

      64e213038d35523da1a3c734a9a7d165d199ad9c43a2c06e6394702f9589ec65

    • SHA512

      d6938b658fbc445e05329448a9c767047699fc46152285d8f25fb83e0e11e2b6614d8fc176f3ebcf54b90f251b14516e3725282cabfacd6628bf1d470920b5c3

    • SSDEEP

      24576:0EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZR:Rfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.