General

  • Target

    2025-02-05_5c8ed6be9c8ac04c865c298718f2ccfe_mafia

  • Size

    10.5MB

  • Sample

    250205-3kzbdaxrbq

  • MD5

    5c8ed6be9c8ac04c865c298718f2ccfe

  • SHA1

    ca7ad1ec8dff5c70baa0ef32f485bfe52f340e6a

  • SHA256

    8155d7a833a20b302c9a529ad3e7f7125ad23118c408f862e35536e079575b74

  • SHA512

    37a4873a0e837ce19f465ba1cd52cf053a8ef8c855bfd13b6cbf18a560026e7d5604af28da4eb7938aed935924e07c86955e72072eb005fe3e0db204b28cf6f8

  • SSDEEP

    196608:ZyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/:UXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXv

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_5c8ed6be9c8ac04c865c298718f2ccfe_mafia

    • Size

      10.5MB

    • MD5

      5c8ed6be9c8ac04c865c298718f2ccfe

    • SHA1

      ca7ad1ec8dff5c70baa0ef32f485bfe52f340e6a

    • SHA256

      8155d7a833a20b302c9a529ad3e7f7125ad23118c408f862e35536e079575b74

    • SHA512

      37a4873a0e837ce19f465ba1cd52cf053a8ef8c855bfd13b6cbf18a560026e7d5604af28da4eb7938aed935924e07c86955e72072eb005fe3e0db204b28cf6f8

    • SSDEEP

      196608:ZyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/:UXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXv

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks