General

  • Target

    2025-02-07_e05d9278dc7aa520dc9515f9041e3c40_mafia

  • Size

    12.7MB

  • Sample

    250207-qe95ga1rev

  • MD5

    e05d9278dc7aa520dc9515f9041e3c40

  • SHA1

    a08661c3f7931b4bf14033523772919b7dc3c6cb

  • SHA256

    97a7e086d946e1b070d30772ab6b70558ecb5f7ef5c82cacde6bbbc30a7bc76b

  • SHA512

    3a05a9dab3203e195c5458ef57632071419a1f1d9c9da921e4abc21bb39fb460f0e76b0cb981a6f71304244ea7d09a5bf6ccba682f4fa73d412782306bd40a17

  • SSDEEP

    3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/5:1OMdRQr7OB0ypmMXnl8XEPM3noSWOCK

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_e05d9278dc7aa520dc9515f9041e3c40_mafia

    • Size

      12.7MB

    • MD5

      e05d9278dc7aa520dc9515f9041e3c40

    • SHA1

      a08661c3f7931b4bf14033523772919b7dc3c6cb

    • SHA256

      97a7e086d946e1b070d30772ab6b70558ecb5f7ef5c82cacde6bbbc30a7bc76b

    • SHA512

      3a05a9dab3203e195c5458ef57632071419a1f1d9c9da921e4abc21bb39fb460f0e76b0cb981a6f71304244ea7d09a5bf6ccba682f4fa73d412782306bd40a17

    • SSDEEP

      3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/5:1OMdRQr7OB0ypmMXnl8XEPM3noSWOCK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks