General

  • Target

    2025-02-05_f9e40e411a7ab534dc0d116ada8920aa_mafia

  • Size

    14.5MB

  • Sample

    250205-v9ghvsyphj

  • MD5

    f9e40e411a7ab534dc0d116ada8920aa

  • SHA1

    158d1b0246aead9fb79f2c54938bddc7b02462cf

  • SHA256

    ce927ec25afbc8286b66340bc776232e59d30fa1182bdc1092a9ae1226d75ca5

  • SHA512

    8aba23f118cf0dae109755e07f4ab8dbaf47f1f4b2c440b15b01f41a5f59dbea33013fd64dff99f8919b1a3c12c67a1199bf229d9ea19e957d2f3f00a338fb6e

  • SSDEEP

    24576:6EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZm:TfotQ

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_f9e40e411a7ab534dc0d116ada8920aa_mafia

    • Size

      14.5MB

    • MD5

      f9e40e411a7ab534dc0d116ada8920aa

    • SHA1

      158d1b0246aead9fb79f2c54938bddc7b02462cf

    • SHA256

      ce927ec25afbc8286b66340bc776232e59d30fa1182bdc1092a9ae1226d75ca5

    • SHA512

      8aba23f118cf0dae109755e07f4ab8dbaf47f1f4b2c440b15b01f41a5f59dbea33013fd64dff99f8919b1a3c12c67a1199bf229d9ea19e957d2f3f00a338fb6e

    • SSDEEP

      24576:6EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZm:TfotQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks