General

  • Target

    2025-02-06_cab9149269e443fdbc3f398e69a5ae04_mafia

  • Size

    11.2MB

  • Sample

    250206-hv18hawrfx

  • MD5

    cab9149269e443fdbc3f398e69a5ae04

  • SHA1

    d59887c34754e965b8ec02ab985f9b7b1cc19ece

  • SHA256

    0ac1a0b9c4fcd4c3b20d15b7d59f3a10356a23df796d4f12b2ef5dbd123dc200

  • SHA512

    4d309050b9a2fdb836b21336a9cafe8cea5039b650ac747a2d6713627938ec7f9da2ce9c2f25822fdc343bf0eec49c2002063b412d469be0784bc931c011016c

  • SSDEEP

    24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZb:4fotp

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-06_cab9149269e443fdbc3f398e69a5ae04_mafia

    • Size

      11.2MB

    • MD5

      cab9149269e443fdbc3f398e69a5ae04

    • SHA1

      d59887c34754e965b8ec02ab985f9b7b1cc19ece

    • SHA256

      0ac1a0b9c4fcd4c3b20d15b7d59f3a10356a23df796d4f12b2ef5dbd123dc200

    • SHA512

      4d309050b9a2fdb836b21336a9cafe8cea5039b650ac747a2d6713627938ec7f9da2ce9c2f25822fdc343bf0eec49c2002063b412d469be0784bc931c011016c

    • SSDEEP

      24576:rEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZb:4fotp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks