General

  • Target

    2025-02-02_1e9e9885708a14f2cba86d51c4868636_mafia

  • Size

    13.1MB

  • Sample

    250202-yxmqwsynem

  • MD5

    1e9e9885708a14f2cba86d51c4868636

  • SHA1

    82347df849fe9e5f1c109e98a55aa4a87f02d6c9

  • SHA256

    631e4b7cd1f6f46adb711082731df6272005bbb08a60816958940926620fa003

  • SHA512

    fa215415e49138a260b037294541a444d31d577d939e8a795f550ca85e6157260bcc300e6b70368b8f9d4dc1b481f209430bc71ec2f38fda601bad69b6a4a0b4

  • SSDEEP

    24576:aEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:zfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_1e9e9885708a14f2cba86d51c4868636_mafia

    • Size

      13.1MB

    • MD5

      1e9e9885708a14f2cba86d51c4868636

    • SHA1

      82347df849fe9e5f1c109e98a55aa4a87f02d6c9

    • SHA256

      631e4b7cd1f6f46adb711082731df6272005bbb08a60816958940926620fa003

    • SHA512

      fa215415e49138a260b037294541a444d31d577d939e8a795f550ca85e6157260bcc300e6b70368b8f9d4dc1b481f209430bc71ec2f38fda601bad69b6a4a0b4

    • SSDEEP

      24576:aEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZT:zfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks