General

  • Target

    2025-02-02_e5f1bb8c7a7ed1461b9a5ddfb21378be_mafia

  • Size

    14.1MB

  • Sample

    250202-zazmlsxmax

  • MD5

    e5f1bb8c7a7ed1461b9a5ddfb21378be

  • SHA1

    e49416e4651f8ba468c2f8e8b67d49e1ad5de6a8

  • SHA256

    7415fec52dfd7122aa4616a22fa1731a5c7039da44a3f073f75488c9f3d9f5e5

  • SHA512

    56c3c99f2e7f209bb85d08795e3589a63409175bab7b149b7eca125426740c7be40b14f90f0539c49ca21dfd1e49cb92953022d7f06b73df5709dcddb18c8a00

  • SSDEEP

    24576:3EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ1:Ufot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_e5f1bb8c7a7ed1461b9a5ddfb21378be_mafia

    • Size

      14.1MB

    • MD5

      e5f1bb8c7a7ed1461b9a5ddfb21378be

    • SHA1

      e49416e4651f8ba468c2f8e8b67d49e1ad5de6a8

    • SHA256

      7415fec52dfd7122aa4616a22fa1731a5c7039da44a3f073f75488c9f3d9f5e5

    • SHA512

      56c3c99f2e7f209bb85d08795e3589a63409175bab7b149b7eca125426740c7be40b14f90f0539c49ca21dfd1e49cb92953022d7f06b73df5709dcddb18c8a00

    • SSDEEP

      24576:3EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ1:Ufot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks