General

  • Target

    2025-02-05_3b9857de29e1beb7de6ec52a79d8b613_mafia

  • Size

    12.4MB

  • Sample

    250205-s91kmasrfs

  • MD5

    3b9857de29e1beb7de6ec52a79d8b613

  • SHA1

    55ca43e75483ae2de702728cc266484a4bc54792

  • SHA256

    25cd89351dd05bd4bc33b2a498ef0b672064f388c004129cdcfd1ef497ccff12

  • SHA512

    902a1ff4a0ff1e6e23c13a231843620ce9667bb0fca2c4170772e9a07e4b026146e565cb170efac070c4bae54d924406c3bddefe4698c0ca2f5a80bea102ea9e

  • SSDEEP

    49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPy:zqtYc3/

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_3b9857de29e1beb7de6ec52a79d8b613_mafia

    • Size

      12.4MB

    • MD5

      3b9857de29e1beb7de6ec52a79d8b613

    • SHA1

      55ca43e75483ae2de702728cc266484a4bc54792

    • SHA256

      25cd89351dd05bd4bc33b2a498ef0b672064f388c004129cdcfd1ef497ccff12

    • SHA512

      902a1ff4a0ff1e6e23c13a231843620ce9667bb0fca2c4170772e9a07e4b026146e565cb170efac070c4bae54d924406c3bddefe4698c0ca2f5a80bea102ea9e

    • SSDEEP

      49152:zqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPy:zqtYc3/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks