General

  • Target

    2025-02-06_5c8dd9bde13889f4abc1f3e62a14e1ad_mafia

  • Size

    12.8MB

  • Sample

    250206-r4gd5azlbm

  • MD5

    5c8dd9bde13889f4abc1f3e62a14e1ad

  • SHA1

    59306df44642a5d7b1d7341739dbb298d189cfe0

  • SHA256

    02c394db4c8a4ca4e1d4a6c06285233de8c74079e4908caa151921936df67598

  • SHA512

    ceb0d0a38d0b3291edd580e57976d6186498f496a7c6758aeae5f6126e01183741bb561bc09759eee7ed097ccf0093b90c44d00ee250b9ba9af60c9e3e1e91eb

  • SSDEEP

    24576:PEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:MfotF

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-06_5c8dd9bde13889f4abc1f3e62a14e1ad_mafia

    • Size

      12.8MB

    • MD5

      5c8dd9bde13889f4abc1f3e62a14e1ad

    • SHA1

      59306df44642a5d7b1d7341739dbb298d189cfe0

    • SHA256

      02c394db4c8a4ca4e1d4a6c06285233de8c74079e4908caa151921936df67598

    • SHA512

      ceb0d0a38d0b3291edd580e57976d6186498f496a7c6758aeae5f6126e01183741bb561bc09759eee7ed097ccf0093b90c44d00ee250b9ba9af60c9e3e1e91eb

    • SSDEEP

      24576:PEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZr:MfotF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks