General

  • Target

    2025-02-03_e19b3e72ff5b9157d1636509198fdfda_mafia

  • Size

    12.6MB

  • Sample

    250203-dhbpvsxpes

  • MD5

    e19b3e72ff5b9157d1636509198fdfda

  • SHA1

    4a892bb3727ca87794aef9156e88c24cae2f82fb

  • SHA256

    83ea7631ee7a2647710983c83b0942c9ded55b4337ed635b3e5dd5f3ca2e01e2

  • SHA512

    f5504269aeede5e74418dc46beb09c0ea17eae481edac32ddd4c3d4e02824f44c6c2ad19aad1dedf5017652c94074818648a5d799e116a7252c3a88581ee9fd4

  • SSDEEP

    3072:lLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:IOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-03_e19b3e72ff5b9157d1636509198fdfda_mafia

    • Size

      12.6MB

    • MD5

      e19b3e72ff5b9157d1636509198fdfda

    • SHA1

      4a892bb3727ca87794aef9156e88c24cae2f82fb

    • SHA256

      83ea7631ee7a2647710983c83b0942c9ded55b4337ed635b3e5dd5f3ca2e01e2

    • SHA512

      f5504269aeede5e74418dc46beb09c0ea17eae481edac32ddd4c3d4e02824f44c6c2ad19aad1dedf5017652c94074818648a5d799e116a7252c3a88581ee9fd4

    • SSDEEP

      3072:lLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:IOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks