General

  • Target

    2025-02-01_e72355b4a0464e46c38ca6b00eb1c8e8_mafia

  • Size

    12.4MB

  • Sample

    250201-zjbl5s1paj

  • MD5

    e72355b4a0464e46c38ca6b00eb1c8e8

  • SHA1

    73f4fda83748ad83cb959734b1efb871f990289b

  • SHA256

    7eec0b84366d92033888fb9def21b46b1d0351de031703e35cc182529682f27a

  • SHA512

    0080f7c14d7582f89555ecb28d7d8e2eb7064048db8c356429b4972d4368d600552bd8108794f999f5ea962e996a432d373367aadfa84a300404f4e61c5f44d9

  • SSDEEP

    24576:uEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZj:Hfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_e72355b4a0464e46c38ca6b00eb1c8e8_mafia

    • Size

      12.4MB

    • MD5

      e72355b4a0464e46c38ca6b00eb1c8e8

    • SHA1

      73f4fda83748ad83cb959734b1efb871f990289b

    • SHA256

      7eec0b84366d92033888fb9def21b46b1d0351de031703e35cc182529682f27a

    • SHA512

      0080f7c14d7582f89555ecb28d7d8e2eb7064048db8c356429b4972d4368d600552bd8108794f999f5ea962e996a432d373367aadfa84a300404f4e61c5f44d9

    • SSDEEP

      24576:uEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZj:Hfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks