General

  • Target

    2025-02-07_f8434478e7a61a25faf87ce5d5598b16_mafia

  • Size

    13.7MB

  • Sample

    250207-ax5ppstqdj

  • MD5

    f8434478e7a61a25faf87ce5d5598b16

  • SHA1

    b394965a56e3a3a18a0f546e9b98fd8100cc924b

  • SHA256

    3e5aada8f5df3358d5c2cb958fee146367d0700db8b12405087d796dd82807aa

  • SHA512

    6062357399739ab3895c0df98f79287c071b0184ea6c1471807393a98cc96b22f5942a95e8052304ef59d62338f553d879b6b030ac060d6533fba2768e77e7a3

  • SSDEEP

    393216:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXP:/

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_f8434478e7a61a25faf87ce5d5598b16_mafia

    • Size

      13.7MB

    • MD5

      f8434478e7a61a25faf87ce5d5598b16

    • SHA1

      b394965a56e3a3a18a0f546e9b98fd8100cc924b

    • SHA256

      3e5aada8f5df3358d5c2cb958fee146367d0700db8b12405087d796dd82807aa

    • SHA512

      6062357399739ab3895c0df98f79287c071b0184ea6c1471807393a98cc96b22f5942a95e8052304ef59d62338f553d879b6b030ac060d6533fba2768e77e7a3

    • SSDEEP

      393216:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXP:/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks