General

  • Target

    2025-02-06_29e1126fcba68248296bf20009a68bac_mafia

  • Size

    13.6MB

  • Sample

    250206-r32zfazlak

  • MD5

    29e1126fcba68248296bf20009a68bac

  • SHA1

    699dd7a56331e9d5c247f905df57cc08222f897b

  • SHA256

    d719af4c9c249a50ea42eb6f01f559855748abd528c324358621eee50430bf14

  • SHA512

    0d491b7b020e667a648086e348d3f968a9870a11ad92ce189e7979a0e18bbce8107ed3e6e2b6f6de1b2f864155098c9279e8e4fddbdaa2b831343a0370686b49

  • SSDEEP

    24576:t/0dLk3X4ICvkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkL:F0dLk3ohU

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-06_29e1126fcba68248296bf20009a68bac_mafia

    • Size

      13.6MB

    • MD5

      29e1126fcba68248296bf20009a68bac

    • SHA1

      699dd7a56331e9d5c247f905df57cc08222f897b

    • SHA256

      d719af4c9c249a50ea42eb6f01f559855748abd528c324358621eee50430bf14

    • SHA512

      0d491b7b020e667a648086e348d3f968a9870a11ad92ce189e7979a0e18bbce8107ed3e6e2b6f6de1b2f864155098c9279e8e4fddbdaa2b831343a0370686b49

    • SSDEEP

      24576:t/0dLk3X4ICvkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkL:F0dLk3ohU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks