General

  • Target

    2025-03-30_13355c74d629d664e92b0e27571d1346_amadey_rhadamanthys_smoke-loader

  • Size

    10.2MB

  • Sample

    250330-k5pcssxnx9

  • MD5

    13355c74d629d664e92b0e27571d1346

  • SHA1

    e3735ba4bf141c554d60990b0706c186cab2e05a

  • SHA256

    6d44792575295dad386ca0d6e3180d075991a608589bc40c0389eb3a2c4c05f6

  • SHA512

    20acdcb8026532b1d163731cce52c7b5d484bc7395c9188d93cdcb0d71aa78e7e61d2e773922fab7937cae29a343de708c2d24173c3b7b086845d52880c94559

  • SSDEEP

    3072:0BN4rEN16Mt1D9C2aBfRnL3I2xdQS7mVKHbw5uA27C9mv3epNGMZIv64j3w/0nMS:MG+lQfRnL3377QK7s2W9mv7kKrynS

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_13355c74d629d664e92b0e27571d1346_amadey_rhadamanthys_smoke-loader

    • Size

      10.2MB

    • MD5

      13355c74d629d664e92b0e27571d1346

    • SHA1

      e3735ba4bf141c554d60990b0706c186cab2e05a

    • SHA256

      6d44792575295dad386ca0d6e3180d075991a608589bc40c0389eb3a2c4c05f6

    • SHA512

      20acdcb8026532b1d163731cce52c7b5d484bc7395c9188d93cdcb0d71aa78e7e61d2e773922fab7937cae29a343de708c2d24173c3b7b086845d52880c94559

    • SSDEEP

      3072:0BN4rEN16Mt1D9C2aBfRnL3I2xdQS7mVKHbw5uA27C9mv3epNGMZIv64j3w/0nMS:MG+lQfRnL3377QK7s2W9mv7kKrynS

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks