General

  • Target

    2025-02-07_a0c9e2c571293b4efafe4b470280e7ac_mafia

  • Size

    12.6MB

  • Sample

    250207-hq1q6ssqav

  • MD5

    a0c9e2c571293b4efafe4b470280e7ac

  • SHA1

    56f872cb11a7b988c7d2321a92e785120f2c581c

  • SHA256

    5117fcff0503e34cc1afe7d34d3d6cad66d2f085e796bb70e869466d6ff3d7fb

  • SHA512

    99e9fcf490cca84e43b7d0e275bb85cb876f768636d6f7cb4ebbfac15cc5873872c2d89ed49a57f5ba45a02a9eb81d640e4e5fbf73a0f5a8b90e55e7a7e3078e

  • SSDEEP

    24576:LEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ:Yfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_a0c9e2c571293b4efafe4b470280e7ac_mafia

    • Size

      12.6MB

    • MD5

      a0c9e2c571293b4efafe4b470280e7ac

    • SHA1

      56f872cb11a7b988c7d2321a92e785120f2c581c

    • SHA256

      5117fcff0503e34cc1afe7d34d3d6cad66d2f085e796bb70e869466d6ff3d7fb

    • SHA512

      99e9fcf490cca84e43b7d0e275bb85cb876f768636d6f7cb4ebbfac15cc5873872c2d89ed49a57f5ba45a02a9eb81d640e4e5fbf73a0f5a8b90e55e7a7e3078e

    • SSDEEP

      24576:LEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ:Yfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks