General

  • Target

    2025-02-07_c70185c3b9221cd71d44049748bbbf5c_mafia

  • Size

    12.5MB

  • Sample

    250207-1bsq5aymfv

  • MD5

    c70185c3b9221cd71d44049748bbbf5c

  • SHA1

    8a8e719e97dbc9caace55dd2b01d15cde517d4f7

  • SHA256

    db63914da2e86c9436713c9aafeaf23a6d927fb273646aca7125da7258e539b5

  • SHA512

    b95e8e3e8a3c34ffe79ae56da81a22e5f4f1fc0913786480c849146383aa3b67195fa7a7d24dbfae771fa4efb056ee3033b4902a5437224cf8bd83703752bf5d

  • SSDEEP

    6144:zLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQw:ITYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_c70185c3b9221cd71d44049748bbbf5c_mafia

    • Size

      12.5MB

    • MD5

      c70185c3b9221cd71d44049748bbbf5c

    • SHA1

      8a8e719e97dbc9caace55dd2b01d15cde517d4f7

    • SHA256

      db63914da2e86c9436713c9aafeaf23a6d927fb273646aca7125da7258e539b5

    • SHA512

      b95e8e3e8a3c34ffe79ae56da81a22e5f4f1fc0913786480c849146383aa3b67195fa7a7d24dbfae771fa4efb056ee3033b4902a5437224cf8bd83703752bf5d

    • SSDEEP

      6144:zLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQw:ITYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks