General

  • Target

    2025-02-07_5f6da24126e4a10d918138c0fede00b3_mafia

  • Size

    12.8MB

  • Sample

    250207-pymmva1lfv

  • MD5

    5f6da24126e4a10d918138c0fede00b3

  • SHA1

    f4dbc10b7816a295ae5fbe0dedc97c0cc5a77efd

  • SHA256

    b8434955e89048aed065797f41580e2e57c4c88a0a041fe5dd318b93cd8bf488

  • SHA512

    d31544ad2aea2469c757f7d6ca9e432c9363a8907f3437a6b944dd339a28c092cd62934e6d1f98af7ec72c26e2487da6ffdca4c025876ff2c332d6a06bc75cb2

  • SSDEEP

    24576:BpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:booh

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_5f6da24126e4a10d918138c0fede00b3_mafia

    • Size

      12.8MB

    • MD5

      5f6da24126e4a10d918138c0fede00b3

    • SHA1

      f4dbc10b7816a295ae5fbe0dedc97c0cc5a77efd

    • SHA256

      b8434955e89048aed065797f41580e2e57c4c88a0a041fe5dd318b93cd8bf488

    • SHA512

      d31544ad2aea2469c757f7d6ca9e432c9363a8907f3437a6b944dd339a28c092cd62934e6d1f98af7ec72c26e2487da6ffdca4c025876ff2c332d6a06bc75cb2

    • SSDEEP

      24576:BpomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttH:booh

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks