General

  • Target

    2025-02-07_276b4f17ffddb64b8505af193393d579_mafia

  • Size

    14.3MB

  • Sample

    250207-zy5hrsypal

  • MD5

    276b4f17ffddb64b8505af193393d579

  • SHA1

    5a148075a39b30b300e3f186dc062087afb0128f

  • SHA256

    9c6888578ddb501debf18b5ebaa506eccfc6c7df852f19b10d677d9457ffc691

  • SHA512

    24cfb2af3e5b800b0c8b76817e8d6742d5273c303ff961b76f5cc365ec536d9cb3dfe96f2a83b39050d6ac7bb66b1fa380f08d38469ef2010a115898020cff2e

  • SSDEEP

    393216:iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-07_276b4f17ffddb64b8505af193393d579_mafia

    • Size

      14.3MB

    • MD5

      276b4f17ffddb64b8505af193393d579

    • SHA1

      5a148075a39b30b300e3f186dc062087afb0128f

    • SHA256

      9c6888578ddb501debf18b5ebaa506eccfc6c7df852f19b10d677d9457ffc691

    • SHA512

      24cfb2af3e5b800b0c8b76817e8d6742d5273c303ff961b76f5cc365ec536d9cb3dfe96f2a83b39050d6ac7bb66b1fa380f08d38469ef2010a115898020cff2e

    • SSDEEP

      393216:iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks