General

  • Target

    2025-02-05_71bdd2cf5e8b2968020ea96bcfd22550_mafia

  • Size

    12.2MB

  • Sample

    250205-vk1v7swjas

  • MD5

    71bdd2cf5e8b2968020ea96bcfd22550

  • SHA1

    3cc48bba8242e5a1ad319a17d1c842d6a917ffb2

  • SHA256

    0d18b60dc4fdc65463f68a2c5248fb8d37002f657a5d16aec6b43196870eb116

  • SHA512

    b455b04e7752f4dbffba00c56e617f7de31f38aea5df9424913e07b52371d2f7d4b5c143be3c0e1241032ee535b4dc6dfcef93700bb10b662e626f194aaaf6c6

  • SSDEEP

    24576:h6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ/:IWdLQkp

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_71bdd2cf5e8b2968020ea96bcfd22550_mafia

    • Size

      12.2MB

    • MD5

      71bdd2cf5e8b2968020ea96bcfd22550

    • SHA1

      3cc48bba8242e5a1ad319a17d1c842d6a917ffb2

    • SHA256

      0d18b60dc4fdc65463f68a2c5248fb8d37002f657a5d16aec6b43196870eb116

    • SHA512

      b455b04e7752f4dbffba00c56e617f7de31f38aea5df9424913e07b52371d2f7d4b5c143be3c0e1241032ee535b4dc6dfcef93700bb10b662e626f194aaaf6c6

    • SSDEEP

      24576:h6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ/:IWdLQkp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks