General

  • Target

    2025-02-02_9b7c823ae2126b55d2c42d2d665d4bdc_mafia

  • Size

    10.2MB

  • Sample

    250202-y61zwayrcj

  • MD5

    9b7c823ae2126b55d2c42d2d665d4bdc

  • SHA1

    ee5cd33b2668c6a94e2e77750bf5ec88ad6b6856

  • SHA256

    ae1cbbf63e6551dacf902fdbe4a640a6a6dcfa180d185e02a6eeab4c9965db75

  • SHA512

    e2f63157102151a7370c9b6cf5ec1ebe827410539545b7299db59c19b4c12d3fde482078488ea50cd9a0cc55f49ef21eb9c6b004eb43b6af5701916dabea0a71

  • SSDEEP

    49152:MqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:MqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_9b7c823ae2126b55d2c42d2d665d4bdc_mafia

    • Size

      10.2MB

    • MD5

      9b7c823ae2126b55d2c42d2d665d4bdc

    • SHA1

      ee5cd33b2668c6a94e2e77750bf5ec88ad6b6856

    • SHA256

      ae1cbbf63e6551dacf902fdbe4a640a6a6dcfa180d185e02a6eeab4c9965db75

    • SHA512

      e2f63157102151a7370c9b6cf5ec1ebe827410539545b7299db59c19b4c12d3fde482078488ea50cd9a0cc55f49ef21eb9c6b004eb43b6af5701916dabea0a71

    • SSDEEP

      49152:MqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:MqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks