General

  • Target

    2025-02-02_e1fd400ae4b97ebf1851ed6f7baf790c_mafia

  • Size

    10.5MB

  • Sample

    250202-bl3xeaymft

  • MD5

    e1fd400ae4b97ebf1851ed6f7baf790c

  • SHA1

    780527b1d8b7b6f12c93ea105dbd0ff061faee35

  • SHA256

    c3feae91cbd3153423ae92457907ac8c7868de00950e15d01c938f117294c4da

  • SHA512

    e3b9e41183ce6bb70754b3b680681c972c81eac377b0044d96bc5618aa94d869ee052b03274d6e4dc15b20af5e3c777598cf6fbdb41cb860fc0958f3794389a0

  • SSDEEP

    196608:RyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:8XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_e1fd400ae4b97ebf1851ed6f7baf790c_mafia

    • Size

      10.5MB

    • MD5

      e1fd400ae4b97ebf1851ed6f7baf790c

    • SHA1

      780527b1d8b7b6f12c93ea105dbd0ff061faee35

    • SHA256

      c3feae91cbd3153423ae92457907ac8c7868de00950e15d01c938f117294c4da

    • SHA512

      e3b9e41183ce6bb70754b3b680681c972c81eac377b0044d96bc5618aa94d869ee052b03274d6e4dc15b20af5e3c777598cf6fbdb41cb860fc0958f3794389a0

    • SSDEEP

      196608:RyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:8XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks