General

  • Target

    2025-02-02_b8d6027cebab815e009f45eb5ae3b552_mafia

  • Size

    11.5MB

  • Sample

    250202-ed4erawjaj

  • MD5

    b8d6027cebab815e009f45eb5ae3b552

  • SHA1

    15287551abf440d208148670138c22a5f0eb6102

  • SHA256

    caedd5298fcd325ce726a5070a0140d17ce979b4b72cd8ce549993742f34ec22

  • SHA512

    c3799f3d153c5d09d34a1da9217a29e60b0ae34957a76889989e5eac51a6ccf9361b91cd24c37892f04997533979134fc55ffb92a309be5aa91f74af1fb2f915

  • SSDEEP

    3072:mLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/o:POMdRQr7OB0ypmMXnl8XEPM3noSWOC9

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_b8d6027cebab815e009f45eb5ae3b552_mafia

    • Size

      11.5MB

    • MD5

      b8d6027cebab815e009f45eb5ae3b552

    • SHA1

      15287551abf440d208148670138c22a5f0eb6102

    • SHA256

      caedd5298fcd325ce726a5070a0140d17ce979b4b72cd8ce549993742f34ec22

    • SHA512

      c3799f3d153c5d09d34a1da9217a29e60b0ae34957a76889989e5eac51a6ccf9361b91cd24c37892f04997533979134fc55ffb92a309be5aa91f74af1fb2f915

    • SSDEEP

      3072:mLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/o:POMdRQr7OB0ypmMXnl8XEPM3noSWOC9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks