General

  • Target

    2025-02-05_894a9eefc5b05d243238afed2b573167_mafia

  • Size

    13.1MB

  • Sample

    250206-abew6awnhs

  • MD5

    894a9eefc5b05d243238afed2b573167

  • SHA1

    7dc5bd6b457cac8c2b5b6ff3edc1ba5eb3d97a82

  • SHA256

    a5e7d70a29f30a9d82c922a5e49eff12db1d47772fceb8012988b4d6001a7b02

  • SHA512

    00fd31f17cef02f5f45156398e1a074230aa0e0383cddca5b2ca6daab68716da29db90d5d26f5f236dd0c795dd5d8870e903cc8ac833890efa8943a0a71d5818

  • SSDEEP

    24576:aEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZn:zfotN

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_894a9eefc5b05d243238afed2b573167_mafia

    • Size

      13.1MB

    • MD5

      894a9eefc5b05d243238afed2b573167

    • SHA1

      7dc5bd6b457cac8c2b5b6ff3edc1ba5eb3d97a82

    • SHA256

      a5e7d70a29f30a9d82c922a5e49eff12db1d47772fceb8012988b4d6001a7b02

    • SHA512

      00fd31f17cef02f5f45156398e1a074230aa0e0383cddca5b2ca6daab68716da29db90d5d26f5f236dd0c795dd5d8870e903cc8ac833890efa8943a0a71d5818

    • SSDEEP

      24576:aEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZn:zfotN

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks