General

  • Target

    2025-02-07_84bf7d5589f060ac9be7580ba979152d_mafia

  • Size

    11.2MB

  • Sample

    250207-z2fzksxpgt

  • MD5

    84bf7d5589f060ac9be7580ba979152d

  • SHA1

    5ccd57c2b6b7672625c156155e3f1c52fffbb8f6

  • SHA256

    36625804f1099ea6e06a519a470c8a82b97aa4e7648a257b72182a60c1d277a6

  • SHA512

    761fd1b449310b223f9162ce688d4f1cd3b663cfeac359624c35fdb2cd75f2dfad50f3e5b643bd12bc1b74d4c8818e5a9622688da6acc2d65c5e724968686e4d

  • SSDEEP

    196608:xyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH:cXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_84bf7d5589f060ac9be7580ba979152d_mafia

    • Size

      11.2MB

    • MD5

      84bf7d5589f060ac9be7580ba979152d

    • SHA1

      5ccd57c2b6b7672625c156155e3f1c52fffbb8f6

    • SHA256

      36625804f1099ea6e06a519a470c8a82b97aa4e7648a257b72182a60c1d277a6

    • SHA512

      761fd1b449310b223f9162ce688d4f1cd3b663cfeac359624c35fdb2cd75f2dfad50f3e5b643bd12bc1b74d4c8818e5a9622688da6acc2d65c5e724968686e4d

    • SSDEEP

      196608:xyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH:cXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks