General

  • Target

    2025-02-05_3636e5c97a13d71ac928ebc9953f2e42_mafia

  • Size

    14.6MB

  • Sample

    250205-nkt94avjcy

  • MD5

    3636e5c97a13d71ac928ebc9953f2e42

  • SHA1

    a2fd90570f9ba78949236d5b6fb54e34f5fedf11

  • SHA256

    35bdb69421abb26baf673435fc3c3675ea6a3f58ebbf88a2e0f4b669f9b3d4b4

  • SHA512

    fa2b2d0381fe3ed992a285f22b44c5df1f78bf12ef3120c7d8522bb347ec8af6c8f7b3e4a57f414d29e751d9a022d98c822b80cc6efd69d532eeb17f351cebf5

  • SSDEEP

    24576:ZpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttX:Doo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_3636e5c97a13d71ac928ebc9953f2e42_mafia

    • Size

      14.6MB

    • MD5

      3636e5c97a13d71ac928ebc9953f2e42

    • SHA1

      a2fd90570f9ba78949236d5b6fb54e34f5fedf11

    • SHA256

      35bdb69421abb26baf673435fc3c3675ea6a3f58ebbf88a2e0f4b669f9b3d4b4

    • SHA512

      fa2b2d0381fe3ed992a285f22b44c5df1f78bf12ef3120c7d8522bb347ec8af6c8f7b3e4a57f414d29e751d9a022d98c822b80cc6efd69d532eeb17f351cebf5

    • SSDEEP

      24576:ZpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttX:Doo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks