General

  • Target

    2025-02-06_5be256baadf55aee357e68335fd616a2_mafia

  • Size

    11.2MB

  • Sample

    250206-ebgg7s1phy

  • MD5

    5be256baadf55aee357e68335fd616a2

  • SHA1

    7bff3df1121620064e2fe0ad949c68bfe8d3cf3a

  • SHA256

    5163d719cbb762221cd05931f443fbe3212137ba8759d8847ba80aa0825a2f19

  • SHA512

    4e58a2cb7f1f72c0fa3f67f2a4b11375a70ae3ff84190aa82bdc46dc266b1588ce6d65550677844bf05106e7c72f0968edef4fda68521703ac64627100b8797d

  • SSDEEP

    24576:kEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZU:BfotG

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-06_5be256baadf55aee357e68335fd616a2_mafia

    • Size

      11.2MB

    • MD5

      5be256baadf55aee357e68335fd616a2

    • SHA1

      7bff3df1121620064e2fe0ad949c68bfe8d3cf3a

    • SHA256

      5163d719cbb762221cd05931f443fbe3212137ba8759d8847ba80aa0825a2f19

    • SHA512

      4e58a2cb7f1f72c0fa3f67f2a4b11375a70ae3ff84190aa82bdc46dc266b1588ce6d65550677844bf05106e7c72f0968edef4fda68521703ac64627100b8797d

    • SSDEEP

      24576:kEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZU:BfotG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks