General

  • Target

    2025-02-03_5064cee5798d773cad820843b51d16e2_mafia

  • Size

    14.6MB

  • Sample

    250203-zvzhcatkby

  • MD5

    5064cee5798d773cad820843b51d16e2

  • SHA1

    e66564877d3ab5159df18a3b33e6e5d986abb001

  • SHA256

    20b143a42530912526b25054ae421a45ae7aeb25891b0ad8b92089c03187cb11

  • SHA512

    f444e8cc454bc0201a47c63fc78e8e8a12a87dd58614804ef7f28794c245bd371a13b38ee61275fbb937ca337c7f99721baa1c3eb263ff5abe9397bd18f2ba67

  • SSDEEP

    49152:PqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:PqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-03_5064cee5798d773cad820843b51d16e2_mafia

    • Size

      14.6MB

    • MD5

      5064cee5798d773cad820843b51d16e2

    • SHA1

      e66564877d3ab5159df18a3b33e6e5d986abb001

    • SHA256

      20b143a42530912526b25054ae421a45ae7aeb25891b0ad8b92089c03187cb11

    • SHA512

      f444e8cc454bc0201a47c63fc78e8e8a12a87dd58614804ef7f28794c245bd371a13b38ee61275fbb937ca337c7f99721baa1c3eb263ff5abe9397bd18f2ba67

    • SSDEEP

      49152:PqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:PqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks