General

  • Target

    2025-02-04_0abcb3517fa3d3f7125af8e3848ee61a_mafia

  • Size

    14.7MB

  • Sample

    250204-tvtn7stlek

  • MD5

    0abcb3517fa3d3f7125af8e3848ee61a

  • SHA1

    80afec29733f7e81c06e8433d4a3f46d029bade0

  • SHA256

    ebbbf0ab4dcda04918036092a515255e57af81df6ffce76f38b22677171a5900

  • SHA512

    15e562cec99e44b1c2263c8d9fa7f9a48d1da092d8dbdb5bab89bad4481b9073271ca3a58951cb1d580275c8141ed7fb423177770df20ba71c6d3dba8abe31e9

  • SSDEEP

    393216:GXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs:L

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-04_0abcb3517fa3d3f7125af8e3848ee61a_mafia

    • Size

      14.7MB

    • MD5

      0abcb3517fa3d3f7125af8e3848ee61a

    • SHA1

      80afec29733f7e81c06e8433d4a3f46d029bade0

    • SHA256

      ebbbf0ab4dcda04918036092a515255e57af81df6ffce76f38b22677171a5900

    • SHA512

      15e562cec99e44b1c2263c8d9fa7f9a48d1da092d8dbdb5bab89bad4481b9073271ca3a58951cb1d580275c8141ed7fb423177770df20ba71c6d3dba8abe31e9

    • SSDEEP

      393216:GXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs:L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks