General

  • Target

    2025-02-04_6cec5d52b5c1462a842c7c73a284c356_mafia

  • Size

    11.1MB

  • Sample

    250204-r3tm3aypew

  • MD5

    6cec5d52b5c1462a842c7c73a284c356

  • SHA1

    9b97d04106a0c24d465476a63284f9daa9f9c951

  • SHA256

    544694842f7da84bdad251caa2dce8bbcd38aa6c51a6c37ac873ac28c0d6a9eb

  • SHA512

    a6370a38036959248dc983cf57c5bb9d924383719b05fdf15e1bca3fa697c7358b3e947d05ab9e65cc246a26ad087f4ce11b7d119b0c28e0620afd642e6d2f08

  • SSDEEP

    24576:UEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZM:xfoty

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-04_6cec5d52b5c1462a842c7c73a284c356_mafia

    • Size

      11.1MB

    • MD5

      6cec5d52b5c1462a842c7c73a284c356

    • SHA1

      9b97d04106a0c24d465476a63284f9daa9f9c951

    • SHA256

      544694842f7da84bdad251caa2dce8bbcd38aa6c51a6c37ac873ac28c0d6a9eb

    • SHA512

      a6370a38036959248dc983cf57c5bb9d924383719b05fdf15e1bca3fa697c7358b3e947d05ab9e65cc246a26ad087f4ce11b7d119b0c28e0620afd642e6d2f08

    • SSDEEP

      24576:UEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZM:xfoty

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks