General

  • Target

    2025-02-01_ee418b28ee74423c9f4440db31fd0d04_mafia

  • Size

    10.8MB

  • Sample

    250201-zk1yes1pfp

  • MD5

    ee418b28ee74423c9f4440db31fd0d04

  • SHA1

    09f2b70b533a938270d42769d3ac5f13db417e73

  • SHA256

    4ee244b88f4cd591d0b492fecf8a70fc0f7fab84244bdeedc2da57d11487462b

  • SHA512

    fefc5deb8a054ec4c056931276bc6e91d0cf7e64d93b5aa46e27d255701b511041e823c10a7a199622e853162e2bc16e8ea78d2bff5e5f5e71de71608a43b659

  • SSDEEP

    6144:qLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ9:LTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-01_ee418b28ee74423c9f4440db31fd0d04_mafia

    • Size

      10.8MB

    • MD5

      ee418b28ee74423c9f4440db31fd0d04

    • SHA1

      09f2b70b533a938270d42769d3ac5f13db417e73

    • SHA256

      4ee244b88f4cd591d0b492fecf8a70fc0f7fab84244bdeedc2da57d11487462b

    • SHA512

      fefc5deb8a054ec4c056931276bc6e91d0cf7e64d93b5aa46e27d255701b511041e823c10a7a199622e853162e2bc16e8ea78d2bff5e5f5e71de71608a43b659

    • SSDEEP

      6144:qLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQ9:LTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks