General

  • Target

    2025-02-02_ffb1c128dd6c9b76f12d313ac34055a7_mafia

  • Size

    11.2MB

  • Sample

    250202-z981bs1kgm

  • MD5

    ffb1c128dd6c9b76f12d313ac34055a7

  • SHA1

    ff5ff74d8c39aa23ea782b559a3a6f561603445d

  • SHA256

    cf04fcade0de67cd50b38c82d12af9e044fc4fac1f563d9249f0a30583c0142a

  • SHA512

    1a897932c8538b96a0d9519600b026a962989ba8c88f55997c7885dd7c54fdc1264027ebff6b908796faa86e2fb1f54c6dbc21756f3a62abd98af077a44a2171

  • SSDEEP

    24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZj:4fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_ffb1c128dd6c9b76f12d313ac34055a7_mafia

    • Size

      11.2MB

    • MD5

      ffb1c128dd6c9b76f12d313ac34055a7

    • SHA1

      ff5ff74d8c39aa23ea782b559a3a6f561603445d

    • SHA256

      cf04fcade0de67cd50b38c82d12af9e044fc4fac1f563d9249f0a30583c0142a

    • SHA512

      1a897932c8538b96a0d9519600b026a962989ba8c88f55997c7885dd7c54fdc1264027ebff6b908796faa86e2fb1f54c6dbc21756f3a62abd98af077a44a2171

    • SSDEEP

      24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZj:4fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks