General

  • Target

    2025-02-07_83fb012a3af17f7ee03fa6b70fb92d99_mafia

  • Size

    14.6MB

  • Sample

    250207-cg45cawnek

  • MD5

    83fb012a3af17f7ee03fa6b70fb92d99

  • SHA1

    23e602b8d722fb7ef210a986e5b652ba3dc2e02d

  • SHA256

    ec9ac642df40ab28d21938e59b719607beac2bafa200591f58df8d25eebaa3e5

  • SHA512

    542d239756bb821d579ea836633122c5334c9c93b69e1b9355add7a56561351cd61643d85b71d239e596d94bf172aabcb974a9131fb43d1a247d18915f745b3a

  • SSDEEP

    24576:x6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQw:YWdLQk

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_83fb012a3af17f7ee03fa6b70fb92d99_mafia

    • Size

      14.6MB

    • MD5

      83fb012a3af17f7ee03fa6b70fb92d99

    • SHA1

      23e602b8d722fb7ef210a986e5b652ba3dc2e02d

    • SHA256

      ec9ac642df40ab28d21938e59b719607beac2bafa200591f58df8d25eebaa3e5

    • SHA512

      542d239756bb821d579ea836633122c5334c9c93b69e1b9355add7a56561351cd61643d85b71d239e596d94bf172aabcb974a9131fb43d1a247d18915f745b3a

    • SSDEEP

      24576:x6WdLQkyQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQw:YWdLQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks