General

  • Target

    2025-02-05_7867b919ca8f673983a2870544a88110_mafia

  • Size

    11.1MB

  • Sample

    250205-2dkzqswpep

  • MD5

    7867b919ca8f673983a2870544a88110

  • SHA1

    4780d79a243ae7f189831178c37ce4e68e33decf

  • SHA256

    7a102e4f927d482372077e66f62e8c97b0ed1e043a5007a8691ac0a2d50513c7

  • SHA512

    e7ccf1d2f3f9d58778e71249c1199a529de823e1cca597970868fc4f21a09895693bce3a771246094cf40a1ef97bbc607caa19dfeeb8f2599b48ed5371ab355f

  • SSDEEP

    49152:WqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPe:WqtYc3v

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_7867b919ca8f673983a2870544a88110_mafia

    • Size

      11.1MB

    • MD5

      7867b919ca8f673983a2870544a88110

    • SHA1

      4780d79a243ae7f189831178c37ce4e68e33decf

    • SHA256

      7a102e4f927d482372077e66f62e8c97b0ed1e043a5007a8691ac0a2d50513c7

    • SHA512

      e7ccf1d2f3f9d58778e71249c1199a529de823e1cca597970868fc4f21a09895693bce3a771246094cf40a1ef97bbc607caa19dfeeb8f2599b48ed5371ab355f

    • SSDEEP

      49152:WqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPe:WqtYc3v

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks