General

  • Target

    2025-02-06_f17438ac054c87900a20fe7ff982df84_mafia

  • Size

    12.9MB

  • Sample

    250206-r7ls1sxqdt

  • MD5

    f17438ac054c87900a20fe7ff982df84

  • SHA1

    d242d99a7ceb3a7bd2b06b5e7a4fe7e862b5bf6e

  • SHA256

    d86f71490a8c2a9ef435c9f3357bc7be2f07d7a485c0647c9eb0c894f7a5d222

  • SHA512

    4d433e847f6c6f4292ba0d0a453c6624563148fbadf8bd2f4dc4d63e75106075242d7879796e01a6c3a3fb20f1a24a6589a3db0321807a967895ab59fca6837d

  • SSDEEP

    6144:hLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQF:iTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-06_f17438ac054c87900a20fe7ff982df84_mafia

    • Size

      12.9MB

    • MD5

      f17438ac054c87900a20fe7ff982df84

    • SHA1

      d242d99a7ceb3a7bd2b06b5e7a4fe7e862b5bf6e

    • SHA256

      d86f71490a8c2a9ef435c9f3357bc7be2f07d7a485c0647c9eb0c894f7a5d222

    • SHA512

      4d433e847f6c6f4292ba0d0a453c6624563148fbadf8bd2f4dc4d63e75106075242d7879796e01a6c3a3fb20f1a24a6589a3db0321807a967895ab59fca6837d

    • SSDEEP

      6144:hLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQF:iTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks