General

  • Target

    2025-02-07_4fdb0e5442821a0a286a00fda90b53a7_mafia

  • Size

    10.5MB

  • Sample

    250207-mfjgcsxnhw

  • MD5

    4fdb0e5442821a0a286a00fda90b53a7

  • SHA1

    ae748a664c3fd546ec1d233b12ebbf134a32cee9

  • SHA256

    ca7f5c52ddcc9e02484ca03eef51b4e5f1b5227e0bf4284c0b013117d1c11fa1

  • SHA512

    36c1d87cba7328a4eea8caebb95a066bfce3865459d3a336bd87323439fd4de56167a683c0dfdcf72f8b7a24a1e483039e632ddf50c0926b433e82d44303b0f1

  • SSDEEP

    6144:GLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:XTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_4fdb0e5442821a0a286a00fda90b53a7_mafia

    • Size

      10.5MB

    • MD5

      4fdb0e5442821a0a286a00fda90b53a7

    • SHA1

      ae748a664c3fd546ec1d233b12ebbf134a32cee9

    • SHA256

      ca7f5c52ddcc9e02484ca03eef51b4e5f1b5227e0bf4284c0b013117d1c11fa1

    • SHA512

      36c1d87cba7328a4eea8caebb95a066bfce3865459d3a336bd87323439fd4de56167a683c0dfdcf72f8b7a24a1e483039e632ddf50c0926b433e82d44303b0f1

    • SSDEEP

      6144:GLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:XTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks