General

  • Target

    2025-02-04_38f0a0ac9331f715bef30247af40bbe0_mafia

  • Size

    10.8MB

  • Sample

    250204-q6vh4azjhk

  • MD5

    38f0a0ac9331f715bef30247af40bbe0

  • SHA1

    a3368fd06f38dd5a16756d481ee39d883b6bc188

  • SHA256

    508e0b917e67cc4a91bcb7f6c2935ea1cdddd5133a71a353ca5385f2dfc575ba

  • SHA512

    97baaa0f165ddd7ad038abc480b7cc76b72ae76bd18b1a8612a60a6c647e2f46acfb9825c09bdca5991a8e1a5f4d9b288012bda99b40d2e7d2326aa948902dfb

  • SSDEEP

    24576:E6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQr:pWdLQkh

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-04_38f0a0ac9331f715bef30247af40bbe0_mafia

    • Size

      10.8MB

    • MD5

      38f0a0ac9331f715bef30247af40bbe0

    • SHA1

      a3368fd06f38dd5a16756d481ee39d883b6bc188

    • SHA256

      508e0b917e67cc4a91bcb7f6c2935ea1cdddd5133a71a353ca5385f2dfc575ba

    • SHA512

      97baaa0f165ddd7ad038abc480b7cc76b72ae76bd18b1a8612a60a6c647e2f46acfb9825c09bdca5991a8e1a5f4d9b288012bda99b40d2e7d2326aa948902dfb

    • SSDEEP

      24576:E6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQr:pWdLQkh

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks