General

  • Target

    2025-02-07_d63a4622e1707595f878ed6bde7456de_mafia

  • Size

    11.8MB

  • Sample

    250207-1dra3syngy

  • MD5

    d63a4622e1707595f878ed6bde7456de

  • SHA1

    5625de93a7c606b6243f181864176c06a1b15861

  • SHA256

    538740314f2ba2e73dd1caf07d2aaac3ffba91353f96354c8036a6f6f013c53b

  • SHA512

    40db416be357ab6ac8e025d988768b9464688c409a90dc0eb7d1d245c8965dec8268b473d972b773903fa85234b27c188f02c57d82ab519bac0b95e5c6d21bd7

  • SSDEEP

    24576:mpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:qoo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_d63a4622e1707595f878ed6bde7456de_mafia

    • Size

      11.8MB

    • MD5

      d63a4622e1707595f878ed6bde7456de

    • SHA1

      5625de93a7c606b6243f181864176c06a1b15861

    • SHA256

      538740314f2ba2e73dd1caf07d2aaac3ffba91353f96354c8036a6f6f013c53b

    • SHA512

      40db416be357ab6ac8e025d988768b9464688c409a90dc0eb7d1d245c8965dec8268b473d972b773903fa85234b27c188f02c57d82ab519bac0b95e5c6d21bd7

    • SSDEEP

      24576:mpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:qoo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks