General

  • Target

    2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader

  • Size

    12.3MB

  • Sample

    250330-k6ak2avxd1

  • MD5

    17fe13437716d7ce13eab20072a470a2

  • SHA1

    6e07b55596f7e4b516f3e313a0aa534b178069bd

  • SHA256

    23994d6b107a601793968043b2300a102c53d14278b3fd335ce69f7566cda3d4

  • SHA512

    3761ff74da517c702a0237ed6a2b7065dd0a6d4a7d00fc139a0d19da2fd15ec66e59f4764d797f0593490957d6a811887a26cf6a046ee546a4c85faed703e870

  • SSDEEP

    6144:9AvhPJRn+Uy8dLqZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZE:9UhpLd/

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader

    • Size

      12.3MB

    • MD5

      17fe13437716d7ce13eab20072a470a2

    • SHA1

      6e07b55596f7e4b516f3e313a0aa534b178069bd

    • SHA256

      23994d6b107a601793968043b2300a102c53d14278b3fd335ce69f7566cda3d4

    • SHA512

      3761ff74da517c702a0237ed6a2b7065dd0a6d4a7d00fc139a0d19da2fd15ec66e59f4764d797f0593490957d6a811887a26cf6a046ee546a4c85faed703e870

    • SSDEEP

      6144:9AvhPJRn+Uy8dLqZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZE:9UhpLd/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks