General

  • Target

    2025-02-07_853c673f9ca067a4f06b5bb2c929c0dc_mafia

  • Size

    10.4MB

  • Sample

    250207-z2nz7ayqdj

  • MD5

    853c673f9ca067a4f06b5bb2c929c0dc

  • SHA1

    ae2391ae24a1ad82b7c65dd0e4b3af6191536d64

  • SHA256

    76e851fe7246063d9f3efd757de49a121d8b2c18050da0405de9d50feb4c7bd5

  • SHA512

    3a0762dbc072e23bd209e58c770f13e6cdde2a48c1c3ae082beaf582d982b11cefaa8d3bf6d1c6568353ea9229bf6a62eabeb3f1f13cd73a6724ed95eaac1ce3

  • SSDEEP

    24576:uEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZD:Hfot

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_853c673f9ca067a4f06b5bb2c929c0dc_mafia

    • Size

      10.4MB

    • MD5

      853c673f9ca067a4f06b5bb2c929c0dc

    • SHA1

      ae2391ae24a1ad82b7c65dd0e4b3af6191536d64

    • SHA256

      76e851fe7246063d9f3efd757de49a121d8b2c18050da0405de9d50feb4c7bd5

    • SHA512

      3a0762dbc072e23bd209e58c770f13e6cdde2a48c1c3ae082beaf582d982b11cefaa8d3bf6d1c6568353ea9229bf6a62eabeb3f1f13cd73a6724ed95eaac1ce3

    • SSDEEP

      24576:uEfmTNIkv/ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZD:Hfot

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks