General

  • Target

    2025-02-07_87c7f97e80e543942db4b3abc03e96db_mafia

  • Size

    14.8MB

  • Sample

    250207-z2fc2sxpgs

  • MD5

    87c7f97e80e543942db4b3abc03e96db

  • SHA1

    bd4f50648f2a28536638609ba513986c05379e50

  • SHA256

    d0a01bf458e4fc5d53eb73fc08806f229eeedd9d95f599434c6219f89854f499

  • SHA512

    0f4a003bc3e2917151e203ce58c8ed2975e9df0a934981aa17815e9d9e02edaf875363f920a8d04c3e1cee9d44cb9a33fc01414c5f1c8613c6a414edb6e2e751

  • SSDEEP

    24576:4EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZP:1fot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_87c7f97e80e543942db4b3abc03e96db_mafia

    • Size

      14.8MB

    • MD5

      87c7f97e80e543942db4b3abc03e96db

    • SHA1

      bd4f50648f2a28536638609ba513986c05379e50

    • SHA256

      d0a01bf458e4fc5d53eb73fc08806f229eeedd9d95f599434c6219f89854f499

    • SHA512

      0f4a003bc3e2917151e203ce58c8ed2975e9df0a934981aa17815e9d9e02edaf875363f920a8d04c3e1cee9d44cb9a33fc01414c5f1c8613c6a414edb6e2e751

    • SSDEEP

      24576:4EfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZP:1fot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks