General

  • Target

    2025-02-07_aae43fa6b3f27f8df9ff8854a839c4fe_mafia

  • Size

    13.9MB

  • Sample

    250207-z7tgvszkfk

  • MD5

    aae43fa6b3f27f8df9ff8854a839c4fe

  • SHA1

    7a8672db1d7c3a75162f76190b90a85a7bb02f60

  • SHA256

    b7386e0050452f12db270edb540853a2b10a005609671d2d5f087bbd7b153f2d

  • SHA512

    20153e2d44d9863db43b2db057fdd7fc553f17a3eeeba35c9d8bbd13f37f6744e4cb22334f62831cc05fe28e02b40b1ee658152be15512e1d2d2938b872ba689

  • SSDEEP

    49152:bqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:bqtYc3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_aae43fa6b3f27f8df9ff8854a839c4fe_mafia

    • Size

      13.9MB

    • MD5

      aae43fa6b3f27f8df9ff8854a839c4fe

    • SHA1

      7a8672db1d7c3a75162f76190b90a85a7bb02f60

    • SHA256

      b7386e0050452f12db270edb540853a2b10a005609671d2d5f087bbd7b153f2d

    • SHA512

      20153e2d44d9863db43b2db057fdd7fc553f17a3eeeba35c9d8bbd13f37f6744e4cb22334f62831cc05fe28e02b40b1ee658152be15512e1d2d2938b872ba689

    • SSDEEP

      49152:bqE0YKr3fYPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:bqtYc3

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks