General

  • Target

    2025-02-02_1705f6e9eef537fcdde2eb5f74100873_mafia

  • Size

    14.9MB

  • Sample

    250202-yw7dxayndm

  • MD5

    1705f6e9eef537fcdde2eb5f74100873

  • SHA1

    63351f6c99df692f9d2a06e7b810df741a356f42

  • SHA256

    fb2fa847a71466bb96ed80e586855c44b9522a61be554bc3baeac519fb1b97fc

  • SHA512

    e1fffcc34e20fccc99d246280eba2d009916d1370d7d32105689f84771f1f1e427e71711ecc1e3bc1efe0464d4a32c98e4fa82317b1c9c030bb28170517909bb

  • SSDEEP

    24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZf:ofot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_1705f6e9eef537fcdde2eb5f74100873_mafia

    • Size

      14.9MB

    • MD5

      1705f6e9eef537fcdde2eb5f74100873

    • SHA1

      63351f6c99df692f9d2a06e7b810df741a356f42

    • SHA256

      fb2fa847a71466bb96ed80e586855c44b9522a61be554bc3baeac519fb1b97fc

    • SHA512

      e1fffcc34e20fccc99d246280eba2d009916d1370d7d32105689f84771f1f1e427e71711ecc1e3bc1efe0464d4a32c98e4fa82317b1c9c030bb28170517909bb

    • SSDEEP

      24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZf:ofot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks