General

  • Target

    2025-02-02_cebb32a3b84cde5e55cc7b64a9914377_mafia

  • Size

    14.3MB

  • Sample

    250202-ykgdcaykak

  • MD5

    cebb32a3b84cde5e55cc7b64a9914377

  • SHA1

    d13b9017f34b552873b960ceb2cb6777a54a8a6d

  • SHA256

    0845aaef799678f1d124bd4ec9d901793f63bfafc19dc1a1d43f930850c2ed9d

  • SHA512

    07a9740d8209c037520acaac320ddc8ffa42ef5b5202fd77d997deb56242e36b3f0916b092987b72015c83eea92867ca4e102867ff7a6d3e5e941fe12ffc4494

  • SSDEEP

    6144:aLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQF:bTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_cebb32a3b84cde5e55cc7b64a9914377_mafia

    • Size

      14.3MB

    • MD5

      cebb32a3b84cde5e55cc7b64a9914377

    • SHA1

      d13b9017f34b552873b960ceb2cb6777a54a8a6d

    • SHA256

      0845aaef799678f1d124bd4ec9d901793f63bfafc19dc1a1d43f930850c2ed9d

    • SHA512

      07a9740d8209c037520acaac320ddc8ffa42ef5b5202fd77d997deb56242e36b3f0916b092987b72015c83eea92867ca4e102867ff7a6d3e5e941fe12ffc4494

    • SSDEEP

      6144:aLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQF:bTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks