General

  • Target

    2025-02-05_3aa787c33abf01521eb7852f9f7c6b76_mafia

  • Size

    13.2MB

  • Sample

    250205-qawraaypdj

  • MD5

    3aa787c33abf01521eb7852f9f7c6b76

  • SHA1

    c2349510cb5e9508f4a95dc1e73d54cdc817cf04

  • SHA256

    92150054297a0b1e11bee1acc01694695ed0ebfb238b1e22ed9b808ac2c4319c

  • SHA512

    0a6cbe6dbe83bcd3e0e4e76c3aba370d64b3a278b49e194d1d55db929ffe28f3d8d09547e167367f6c476e825711cc5a16480b395d0fa4b51cb8c963d444ca50

  • SSDEEP

    6144:QLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQs:FTYe+D2jFu+iZoUFhAzX

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_3aa787c33abf01521eb7852f9f7c6b76_mafia

    • Size

      13.2MB

    • MD5

      3aa787c33abf01521eb7852f9f7c6b76

    • SHA1

      c2349510cb5e9508f4a95dc1e73d54cdc817cf04

    • SHA256

      92150054297a0b1e11bee1acc01694695ed0ebfb238b1e22ed9b808ac2c4319c

    • SHA512

      0a6cbe6dbe83bcd3e0e4e76c3aba370d64b3a278b49e194d1d55db929ffe28f3d8d09547e167367f6c476e825711cc5a16480b395d0fa4b51cb8c963d444ca50

    • SSDEEP

      6144:QLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQs:FTYe+D2jFu+iZoUFhAzX

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks