General

  • Target

    2025-02-02_0622524f0e26a6bfe6ca542938b1a04e_mafia

  • Size

    12.1MB

  • Sample

    250202-yvhzxswqdt

  • MD5

    0622524f0e26a6bfe6ca542938b1a04e

  • SHA1

    8d134385afd883331538bf88d563445dd7a89072

  • SHA256

    7e070b79eb7d7857b5bcd1d356b387e7e24292e096035e22938f5e24e6182e48

  • SHA512

    b56e30fd1b2261006e8ddbd6d5f6629f5429beb3df0f82874053ee96fa44e607ae67a7ae6d18b2a6765104a06d588175c100e1088afe7d69149a0b709965237b

  • SSDEEP

    6144:9LQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQN:uTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_0622524f0e26a6bfe6ca542938b1a04e_mafia

    • Size

      12.1MB

    • MD5

      0622524f0e26a6bfe6ca542938b1a04e

    • SHA1

      8d134385afd883331538bf88d563445dd7a89072

    • SHA256

      7e070b79eb7d7857b5bcd1d356b387e7e24292e096035e22938f5e24e6182e48

    • SHA512

      b56e30fd1b2261006e8ddbd6d5f6629f5429beb3df0f82874053ee96fa44e607ae67a7ae6d18b2a6765104a06d588175c100e1088afe7d69149a0b709965237b

    • SSDEEP

      6144:9LQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQN:uTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks