General

  • Target

    2025-02-02_7ad23caeb2c9e5adc7a3ee8e4881d40c_mafia

  • Size

    14.0MB

  • Sample

    250202-bhbnraykh1

  • MD5

    7ad23caeb2c9e5adc7a3ee8e4881d40c

  • SHA1

    df8f22b2382a5dac799c19b814d8a4c2c6de33d6

  • SHA256

    942030f148b84380bd6d7d6b19ce99a8717e4614333e216e505f0886087a1243

  • SHA512

    cdc90ae7180cdcdcf33b19157439c276459f6bf53af4d43c33292707f2d6bb20a7570a4259e02feb883d9234a37fe0e9575f49ea0d381facef64e2e04dd0dc4e

  • SSDEEP

    24576:ypomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:Woo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_7ad23caeb2c9e5adc7a3ee8e4881d40c_mafia

    • Size

      14.0MB

    • MD5

      7ad23caeb2c9e5adc7a3ee8e4881d40c

    • SHA1

      df8f22b2382a5dac799c19b814d8a4c2c6de33d6

    • SHA256

      942030f148b84380bd6d7d6b19ce99a8717e4614333e216e505f0886087a1243

    • SHA512

      cdc90ae7180cdcdcf33b19157439c276459f6bf53af4d43c33292707f2d6bb20a7570a4259e02feb883d9234a37fe0e9575f49ea0d381facef64e2e04dd0dc4e

    • SSDEEP

      24576:ypomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:Woo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks