General

  • Target

    2025-02-07_39ba856587dcab3f4fdf8d82dfe63442_mafia

  • Size

    13.8MB

  • Sample

    250207-mhcftsxpd1

  • MD5

    39ba856587dcab3f4fdf8d82dfe63442

  • SHA1

    842637910a05dbdcc1d98f4c9b39ae8169039a03

  • SHA256

    f0c9aa5e326d2d098de089c6375bddffbdfea58fe8872be6433498d4ed9b98f8

  • SHA512

    7a94a876ab57962bf0852e7a9d39900f999f636ff92bc27f2521b6918cc3540ba448d8fcb81d044849ddddd95fa96f19a40bd285fbb9bbafd2cd5ab2de485b17

  • SSDEEP

    6144:aLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:bTYe+D2jFu+iZoUFhAz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_39ba856587dcab3f4fdf8d82dfe63442_mafia

    • Size

      13.8MB

    • MD5

      39ba856587dcab3f4fdf8d82dfe63442

    • SHA1

      842637910a05dbdcc1d98f4c9b39ae8169039a03

    • SHA256

      f0c9aa5e326d2d098de089c6375bddffbdfea58fe8872be6433498d4ed9b98f8

    • SHA512

      7a94a876ab57962bf0852e7a9d39900f999f636ff92bc27f2521b6918cc3540ba448d8fcb81d044849ddddd95fa96f19a40bd285fbb9bbafd2cd5ab2de485b17

    • SSDEEP

      6144:aLQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQd:bTYe+D2jFu+iZoUFhAz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks