General

  • Target

    2025-02-03_47ed08a16022179f606ebc1e85a106a2_mafia

  • Size

    11.5MB

  • Sample

    250203-wb8p5ayjaz

  • MD5

    47ed08a16022179f606ebc1e85a106a2

  • SHA1

    ef06e1bfdf17852a217860366ebea4250d5d5b10

  • SHA256

    4a6a65e02edd13135e496081f0b9807ef98b1dfef11aee8d0d7105899edfa626

  • SHA512

    09e07353cef3bf3384818c7db41dc1cb32e59b191c1d5be39b62bfa44f3e70aadf6076edf75bd0f884dcc6b23d8705b2633d889e674e9fd78dfe20b7b5d04d4e

  • SSDEEP

    3072:mLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/i:POMdRQr7OB0ypmMXnl8XEPM3noSWOCb

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-03_47ed08a16022179f606ebc1e85a106a2_mafia

    • Size

      11.5MB

    • MD5

      47ed08a16022179f606ebc1e85a106a2

    • SHA1

      ef06e1bfdf17852a217860366ebea4250d5d5b10

    • SHA256

      4a6a65e02edd13135e496081f0b9807ef98b1dfef11aee8d0d7105899edfa626

    • SHA512

      09e07353cef3bf3384818c7db41dc1cb32e59b191c1d5be39b62bfa44f3e70aadf6076edf75bd0f884dcc6b23d8705b2633d889e674e9fd78dfe20b7b5d04d4e

    • SSDEEP

      3072:mLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/i:POMdRQr7OB0ypmMXnl8XEPM3noSWOCb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks