General

  • Target

    2025-02-04_a87664dadce031ab306fdb20795320bc_mafia

  • Size

    12.6MB

  • Sample

    250204-lwy2bavkcq

  • MD5

    a87664dadce031ab306fdb20795320bc

  • SHA1

    386ce0b08bc13e21b82a2f517581208451de7de7

  • SHA256

    d535b67d8ffe96f8a496131b8cbe8263c50553bd0ee8f335df2f8cc7944f7bf2

  • SHA512

    a71dd8214370ffc66d96e0415f26924f3bf71149816831155a104d0a871db5280fe96538669158dd982bee08c75369893daca58d4d87b99e9d2a9b0c3acf92bd

  • SSDEEP

    393216:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:o

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-04_a87664dadce031ab306fdb20795320bc_mafia

    • Size

      12.6MB

    • MD5

      a87664dadce031ab306fdb20795320bc

    • SHA1

      386ce0b08bc13e21b82a2f517581208451de7de7

    • SHA256

      d535b67d8ffe96f8a496131b8cbe8263c50553bd0ee8f335df2f8cc7944f7bf2

    • SHA512

      a71dd8214370ffc66d96e0415f26924f3bf71149816831155a104d0a871db5280fe96538669158dd982bee08c75369893daca58d4d87b99e9d2a9b0c3acf92bd

    • SSDEEP

      393216:OXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:o

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks