General

  • Target

    2025-02-07_564ea855655c4ab90128c5e817e41078_mafia

  • Size

    12.1MB

  • Sample

    250207-b8gbxswlar

  • MD5

    564ea855655c4ab90128c5e817e41078

  • SHA1

    a5932b4005afb76b32a93272be0a7d3dde40ed60

  • SHA256

    f575adb4f2a662d482bc9fecddb45d2978c8f38be2bb3fc4a7fd617ab1cb20a2

  • SHA512

    e4f407d50563c4ba5a7159180e45691b882a5b7d496a2d4d014625952f217609fb7cf93c988bda7423b7709fd87399ac5de59fba70692c15ac1a4a028afa684c

  • SSDEEP

    24576:OpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:ioo

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_564ea855655c4ab90128c5e817e41078_mafia

    • Size

      12.1MB

    • MD5

      564ea855655c4ab90128c5e817e41078

    • SHA1

      a5932b4005afb76b32a93272be0a7d3dde40ed60

    • SHA256

      f575adb4f2a662d482bc9fecddb45d2978c8f38be2bb3fc4a7fd617ab1cb20a2

    • SHA512

      e4f407d50563c4ba5a7159180e45691b882a5b7d496a2d4d014625952f217609fb7cf93c988bda7423b7709fd87399ac5de59fba70692c15ac1a4a028afa684c

    • SSDEEP

      24576:OpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:ioo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks