General

  • Target

    2025-02-05_2a4054e62f545a11ff21505f6fa3656f_mafia

  • Size

    14.9MB

  • Sample

    250205-nj9y6avjay

  • MD5

    2a4054e62f545a11ff21505f6fa3656f

  • SHA1

    6e8b6780355d671185c6b8a058c3d8196ec57877

  • SHA256

    e7d3cdd25b1c6e87575aafa2aad299880ef0ffce5e3b52c3c54d8742a340565e

  • SHA512

    cd261c4d27d5d30f96a25f54101790a0e9232a099a8d9a0425c94cf0a72c6398bbb6dcfc56b1c46edbb3d58dc3ac69e8043a1e3e2d9c210a6f9d331aa7f67c32

  • SSDEEP

    24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZY:ofot+

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_2a4054e62f545a11ff21505f6fa3656f_mafia

    • Size

      14.9MB

    • MD5

      2a4054e62f545a11ff21505f6fa3656f

    • SHA1

      6e8b6780355d671185c6b8a058c3d8196ec57877

    • SHA256

      e7d3cdd25b1c6e87575aafa2aad299880ef0ffce5e3b52c3c54d8742a340565e

    • SHA512

      cd261c4d27d5d30f96a25f54101790a0e9232a099a8d9a0425c94cf0a72c6398bbb6dcfc56b1c46edbb3d58dc3ac69e8043a1e3e2d9c210a6f9d331aa7f67c32

    • SSDEEP

      24576:bEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZY:ofot+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks