General
-
Target
2025-03-30_174e05f1db60bfe4ff9eb01939032141_amadey_karagany_mafia_rhadamanthys_smoke-loader
-
Size
11.8MB
-
Sample
250330-k551jsxny6
-
MD5
174e05f1db60bfe4ff9eb01939032141
-
SHA1
09fbd30b41e6552d26470241e2e40a8798e1766d
-
SHA256
fe19bd42f8fecfbe7a34ec31d9cf4d581fb1f0fcfdefe7f9d8c7cc5c472ac94a
-
SHA512
b72241131b4f2d3d7e95dd3b305881193baaa027dcfd17784e7a5597ff683f124828c57156182953c605695f3630980111fb8cdb7dca04293e3e0baf28ea6ae6
-
SSDEEP
12288:CXz1MJ3r1eFPOPB4NKnZOMMMMMMMbmUiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiig:CXzWJb1qPOPGNG0MMMMMMMbmD
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_174e05f1db60bfe4ff9eb01939032141_amadey_karagany_mafia_rhadamanthys_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_174e05f1db60bfe4ff9eb01939032141_amadey_karagany_mafia_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-03-30_174e05f1db60bfe4ff9eb01939032141_amadey_karagany_mafia_rhadamanthys_smoke-loader
-
Size
11.8MB
-
MD5
174e05f1db60bfe4ff9eb01939032141
-
SHA1
09fbd30b41e6552d26470241e2e40a8798e1766d
-
SHA256
fe19bd42f8fecfbe7a34ec31d9cf4d581fb1f0fcfdefe7f9d8c7cc5c472ac94a
-
SHA512
b72241131b4f2d3d7e95dd3b305881193baaa027dcfd17784e7a5597ff683f124828c57156182953c605695f3630980111fb8cdb7dca04293e3e0baf28ea6ae6
-
SSDEEP
12288:CXz1MJ3r1eFPOPB4NKnZOMMMMMMMbmUiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiig:CXzWJb1qPOPGNG0MMMMMMMbmD
-
Tofsee family
-
Windows security bypass
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2