General

  • Target

    2025-02-02_cdbaca4721c7f448ae68647df39bf536_mafia

  • Size

    13.5MB

  • Sample

    250202-hrbhnssnal

  • MD5

    cdbaca4721c7f448ae68647df39bf536

  • SHA1

    cb7f96385d9c6f758ead9da6855afaf4b1030295

  • SHA256

    69299f62d1520b99bd8c85ebd76d67d3f87570c14ce5401905a6f402afb3f29c

  • SHA512

    04bb5b6f6b246d27ce9f8d83263f122615781fb6192ac8bd3622f559856aa7fef1cb518dba24f2b6761fce4d7e039e496e62bc9bfaab6980557d4ef5f2cd5ab2

  • SSDEEP

    24576:IEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:Ffot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_cdbaca4721c7f448ae68647df39bf536_mafia

    • Size

      13.5MB

    • MD5

      cdbaca4721c7f448ae68647df39bf536

    • SHA1

      cb7f96385d9c6f758ead9da6855afaf4b1030295

    • SHA256

      69299f62d1520b99bd8c85ebd76d67d3f87570c14ce5401905a6f402afb3f29c

    • SHA512

      04bb5b6f6b246d27ce9f8d83263f122615781fb6192ac8bd3622f559856aa7fef1cb518dba24f2b6761fce4d7e039e496e62bc9bfaab6980557d4ef5f2cd5ab2

    • SSDEEP

      24576:IEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:Ffot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks