General

  • Target

    2025-02-04_110b0142e46e4ff35d73ac6ef54edf18_mafia

  • Size

    12.4MB

  • Sample

    250204-rcxa9szlen

  • MD5

    110b0142e46e4ff35d73ac6ef54edf18

  • SHA1

    ace5c9248b7b7b7fb278631f1f37e090b51e5321

  • SHA256

    534acce949e283b51c9cb3aa59c3d4dcef805cb81c66c8cef485780ae58f4fd3

  • SHA512

    c7464b39f0d158eb88c66f8b83803a10df6ab9f6abacd513e07456894490a0ef8678d3472b23bdf95fb88098c4fd49bfce83966021d5f3cdabe62f413ed20166

  • SSDEEP

    6144:bLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQD:wTYe+D2jFu+iZoUFhAzA

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-04_110b0142e46e4ff35d73ac6ef54edf18_mafia

    • Size

      12.4MB

    • MD5

      110b0142e46e4ff35d73ac6ef54edf18

    • SHA1

      ace5c9248b7b7b7fb278631f1f37e090b51e5321

    • SHA256

      534acce949e283b51c9cb3aa59c3d4dcef805cb81c66c8cef485780ae58f4fd3

    • SHA512

      c7464b39f0d158eb88c66f8b83803a10df6ab9f6abacd513e07456894490a0ef8678d3472b23bdf95fb88098c4fd49bfce83966021d5f3cdabe62f413ed20166

    • SSDEEP

      6144:bLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQD:wTYe+D2jFu+iZoUFhAzA

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks