General

  • Target

    2025-02-05_b985bc364573e8765a7fcdcbbb1f7390_mafia

  • Size

    15.0MB

  • Sample

    250205-xfrsva1jdq

  • MD5

    b985bc364573e8765a7fcdcbbb1f7390

  • SHA1

    0ee5d5f854935f8a9f58e256a806cb9881d339b9

  • SHA256

    87046c613d52528f8e5a124cf885b9f01755fa845f66e6f0af15ef10eabb32b2

  • SHA512

    04a06fd82796195e21a3518c8c576f7fb65ee09795b1e221a4b5846cd3520c3c2cd1ed6ab1cacf3b815b4d12df3d959a1c3e57d941670bcb09b85ac68bf6bde1

  • SSDEEP

    393216:MXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_b985bc364573e8765a7fcdcbbb1f7390_mafia

    • Size

      15.0MB

    • MD5

      b985bc364573e8765a7fcdcbbb1f7390

    • SHA1

      0ee5d5f854935f8a9f58e256a806cb9881d339b9

    • SHA256

      87046c613d52528f8e5a124cf885b9f01755fa845f66e6f0af15ef10eabb32b2

    • SHA512

      04a06fd82796195e21a3518c8c576f7fb65ee09795b1e221a4b5846cd3520c3c2cd1ed6ab1cacf3b815b4d12df3d959a1c3e57d941670bcb09b85ac68bf6bde1

    • SSDEEP

      393216:MXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks