General

  • Target

    2025-03-30_bc6e5d90c52828a3e61150cfa7b1cc0c_amadey_rhadamanthys_smoke-loader

  • Size

    12.1MB

  • Sample

    250330-k6jtpsvxev

  • MD5

    bc6e5d90c52828a3e61150cfa7b1cc0c

  • SHA1

    1ca9759679efdee799039aa008e582cd71239575

  • SHA256

    d6c45f67357a8fd894dce09c6e8719ab58bc803af55567a682c4c976619f5a06

  • SHA512

    798ac75e4eabbc4dc987a1c533f26e9d43d3e27d1bca9ce38cced1bad1c7efe3ceca1d765fe47f0ee0498bd18f62ab0dcb8bd70101c2772fe188e5a0c35be87d

  • SSDEEP

    3072:5CLVCtykRk5Kws3LQfNeBVe/KyNDrr91Q:4eyki5KnUfNeBVe/W

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_bc6e5d90c52828a3e61150cfa7b1cc0c_amadey_rhadamanthys_smoke-loader

    • Size

      12.1MB

    • MD5

      bc6e5d90c52828a3e61150cfa7b1cc0c

    • SHA1

      1ca9759679efdee799039aa008e582cd71239575

    • SHA256

      d6c45f67357a8fd894dce09c6e8719ab58bc803af55567a682c4c976619f5a06

    • SHA512

      798ac75e4eabbc4dc987a1c533f26e9d43d3e27d1bca9ce38cced1bad1c7efe3ceca1d765fe47f0ee0498bd18f62ab0dcb8bd70101c2772fe188e5a0c35be87d

    • SSDEEP

      3072:5CLVCtykRk5Kws3LQfNeBVe/KyNDrr91Q:4eyki5KnUfNeBVe/W

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks