General

  • Target

    2025-02-02_fd6a280e5fff87a9f918e9ef3d084213_mafia

  • Size

    13.8MB

  • Sample

    250202-zblgdaxmby

  • MD5

    fd6a280e5fff87a9f918e9ef3d084213

  • SHA1

    ba66a7db8fd8907d793460708329f71f84e9af15

  • SHA256

    cc8125d8df82f9a50e6dbb64c79ca62280c1c54e34d49be178d79547ee78e832

  • SHA512

    b00cf8e2483f6b27d5463d9b86db53707e8d1568192df6b4b13ede7ca16bae50793e091a5996aeeeb7459481d09962ec43b94d1717b80d14d8e8049bc9a72547

  • SSDEEP

    24576:l6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQf:kWdLQk

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-02_fd6a280e5fff87a9f918e9ef3d084213_mafia

    • Size

      13.8MB

    • MD5

      fd6a280e5fff87a9f918e9ef3d084213

    • SHA1

      ba66a7db8fd8907d793460708329f71f84e9af15

    • SHA256

      cc8125d8df82f9a50e6dbb64c79ca62280c1c54e34d49be178d79547ee78e832

    • SHA512

      b00cf8e2483f6b27d5463d9b86db53707e8d1568192df6b4b13ede7ca16bae50793e091a5996aeeeb7459481d09962ec43b94d1717b80d14d8e8049bc9a72547

    • SSDEEP

      24576:l6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQf:kWdLQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks