General

  • Target

    2025-02-03_99f65f4ddb8945e8854021f9c2a0dbff_mafia

  • Size

    14.9MB

  • Sample

    250203-1a2bwatpes

  • MD5

    99f65f4ddb8945e8854021f9c2a0dbff

  • SHA1

    a0325383e78ca77b58844b4d8d5a4036a8a66b25

  • SHA256

    f24de00dd0f21f382fb42034498b688fde16a4c6de14d2f9cb94bbeab1f89bd7

  • SHA512

    f3ca13ed187c34a29fb04581a2bd1f20087eced1baaba565627a53ce705cfea5948a6229dc88834a099d626a2b588e2d1bdab09486a22032893be0e5037a7359

  • SSDEEP

    49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:zqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-03_99f65f4ddb8945e8854021f9c2a0dbff_mafia

    • Size

      14.9MB

    • MD5

      99f65f4ddb8945e8854021f9c2a0dbff

    • SHA1

      a0325383e78ca77b58844b4d8d5a4036a8a66b25

    • SHA256

      f24de00dd0f21f382fb42034498b688fde16a4c6de14d2f9cb94bbeab1f89bd7

    • SHA512

      f3ca13ed187c34a29fb04581a2bd1f20087eced1baaba565627a53ce705cfea5948a6229dc88834a099d626a2b588e2d1bdab09486a22032893be0e5037a7359

    • SSDEEP

      49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:zqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks