General

  • Target

    2025-02-07_30e099a4573b451c0da1ea4dc4da2e57_mafia

  • Size

    11.5MB

  • Sample

    250207-zqst1axjaw

  • MD5

    30e099a4573b451c0da1ea4dc4da2e57

  • SHA1

    36b684cc8a65bd6fa2d2e02c8624e984777d4334

  • SHA256

    67353688d990ffa27165df8c259dfd107284713e9f83f5f9725e35b86750aeb3

  • SHA512

    10ebee0640512458643f32b5fae2262e0e6fac6cd6f846c0522698a599a9166443d69fedaf30c42345ce8152579a6882fd102c02597f7d316efd93d14c6e00b7

  • SSDEEP

    3072:zLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:6OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_30e099a4573b451c0da1ea4dc4da2e57_mafia

    • Size

      11.5MB

    • MD5

      30e099a4573b451c0da1ea4dc4da2e57

    • SHA1

      36b684cc8a65bd6fa2d2e02c8624e984777d4334

    • SHA256

      67353688d990ffa27165df8c259dfd107284713e9f83f5f9725e35b86750aeb3

    • SHA512

      10ebee0640512458643f32b5fae2262e0e6fac6cd6f846c0522698a599a9166443d69fedaf30c42345ce8152579a6882fd102c02597f7d316efd93d14c6e00b7

    • SSDEEP

      3072:zLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:6OMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks