General

  • Target

    2025-02-03_2b3eb8c627dd2a792145fd7b6016a15b_mafia

  • Size

    13.7MB

  • Sample

    250203-zqmb8asrgy

  • MD5

    2b3eb8c627dd2a792145fd7b6016a15b

  • SHA1

    38a1ba7cb8220d0c52cc0d6fab5b90c1308cf590

  • SHA256

    bbb64a5242eda8d4f5e4a1a4f7242e18f851af80472a63b88d84ff3b0e34f50b

  • SHA512

    e55c4fcd6d2d7f54748489b04abcec77a2483541b6c7643b8b8dd316770e168dc85ed05fa9e101decc8561153edaa657551e82cd7fb04e14360922466b6cf8dc

  • SSDEEP

    3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:1OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-03_2b3eb8c627dd2a792145fd7b6016a15b_mafia

    • Size

      13.7MB

    • MD5

      2b3eb8c627dd2a792145fd7b6016a15b

    • SHA1

      38a1ba7cb8220d0c52cc0d6fab5b90c1308cf590

    • SHA256

      bbb64a5242eda8d4f5e4a1a4f7242e18f851af80472a63b88d84ff3b0e34f50b

    • SHA512

      e55c4fcd6d2d7f54748489b04abcec77a2483541b6c7643b8b8dd316770e168dc85ed05fa9e101decc8561153edaa657551e82cd7fb04e14360922466b6cf8dc

    • SSDEEP

      3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:1OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks