General

  • Target

    2025-02-02_3f4c4c314a9e1e3500b0113f8815655c_mafia

  • Size

    14.5MB

  • Sample

    250202-yzb26sypan

  • MD5

    3f4c4c314a9e1e3500b0113f8815655c

  • SHA1

    f364aebe26f744c276f7944bd52c57eae67a596e

  • SHA256

    9ec3f86d763f85d37b64cec67cabe5a02420d653890b9ece64158b7540ef41fe

  • SHA512

    3e0bad40bd20ddead45e2571760049d2044fe3ebae59ac5efd3d8b5bb073d5f56492320002eda9313ef202fff254a58956ddaf8e4f29bd09997441ea07598dec

  • SSDEEP

    49152:dqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:dqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_3f4c4c314a9e1e3500b0113f8815655c_mafia

    • Size

      14.5MB

    • MD5

      3f4c4c314a9e1e3500b0113f8815655c

    • SHA1

      f364aebe26f744c276f7944bd52c57eae67a596e

    • SHA256

      9ec3f86d763f85d37b64cec67cabe5a02420d653890b9ece64158b7540ef41fe

    • SHA512

      3e0bad40bd20ddead45e2571760049d2044fe3ebae59ac5efd3d8b5bb073d5f56492320002eda9313ef202fff254a58956ddaf8e4f29bd09997441ea07598dec

    • SSDEEP

      49152:dqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:dqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks