General

  • Target

    2025-02-07_99039259a8ef48313104fe4620869457_mafia

  • Size

    10.8MB

  • Sample

    250207-z5qyysyje1

  • MD5

    99039259a8ef48313104fe4620869457

  • SHA1

    d8565d92c48df49a98490092708e8958f65deb37

  • SHA256

    035d12a143129c9bbe2fe00d0e7b2fab6c284cb75cc77cc1455d4c3f133d630b

  • SHA512

    354feddda2f4a6a139200c19b9f6ab048a3f440ecd478cb88e624d4ed70e931ae061409efeb909e8d3194a71758a258bac4b48e874eeff49d3344a22550eee11

  • SSDEEP

    196608:iyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:HXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_99039259a8ef48313104fe4620869457_mafia

    • Size

      10.8MB

    • MD5

      99039259a8ef48313104fe4620869457

    • SHA1

      d8565d92c48df49a98490092708e8958f65deb37

    • SHA256

      035d12a143129c9bbe2fe00d0e7b2fab6c284cb75cc77cc1455d4c3f133d630b

    • SHA512

      354feddda2f4a6a139200c19b9f6ab048a3f440ecd478cb88e624d4ed70e931ae061409efeb909e8d3194a71758a258bac4b48e874eeff49d3344a22550eee11

    • SSDEEP

      196608:iyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:HXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks