General

  • Target

    2025-03-30_ee12a4ff337df96e36254ddef7306765_amadey_karagany_mafia_rhadamanthys_smoke-loader

  • Size

    11.1MB

  • Sample

    250330-k6bhbsxny9

  • MD5

    ee12a4ff337df96e36254ddef7306765

  • SHA1

    5be86f4762736106a2762e8901b0352a31ca3033

  • SHA256

    3a26167f9e1aa82428260ee8aed579e5e484d5b2265e3a841be71cdd958de1b4

  • SHA512

    7d7361ccb8ebab742fa6f1921242c8b8d1f2328c3dd57b4bdc507b523314999d5a2e94dc0f30b2992fbcea35fe9ee6f1f6a58bb638794763ea9b73c4d1d38e29

  • SSDEEP

    24576:JXzqpE5DpEMMMMMMMb4zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzh:JXPVpEMMMMMMMbQ

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_ee12a4ff337df96e36254ddef7306765_amadey_karagany_mafia_rhadamanthys_smoke-loader

    • Size

      11.1MB

    • MD5

      ee12a4ff337df96e36254ddef7306765

    • SHA1

      5be86f4762736106a2762e8901b0352a31ca3033

    • SHA256

      3a26167f9e1aa82428260ee8aed579e5e484d5b2265e3a841be71cdd958de1b4

    • SHA512

      7d7361ccb8ebab742fa6f1921242c8b8d1f2328c3dd57b4bdc507b523314999d5a2e94dc0f30b2992fbcea35fe9ee6f1f6a58bb638794763ea9b73c4d1d38e29

    • SSDEEP

      24576:JXzqpE5DpEMMMMMMMb4zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzh:JXPVpEMMMMMMMbQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks