General

  • Target

    2025-03-30_1c164e228395b76537d9c5f3cb6d1e17_amadey_rhadamanthys_smoke-loader

  • Size

    13.8MB

  • Sample

    250330-k6v7qsvxfs

  • MD5

    1c164e228395b76537d9c5f3cb6d1e17

  • SHA1

    5a3d0f03dd794f846cb8935d3fef26211b568be6

  • SHA256

    f05feea6a054d056065071fa7082af87dc344af42a02c8f08edac5af6df11d21

  • SHA512

    8375c040b4ce4f2a9b8615f35e6abebe5463be78268ab6564928b546412c09fe28a18bbdfade8c401e8510c70035a8e268f04b6e8b7ea3f469663da0d1bd3406

  • SSDEEP

    6144:W8yAzuf/YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYK:Drzufv

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_1c164e228395b76537d9c5f3cb6d1e17_amadey_rhadamanthys_smoke-loader

    • Size

      13.8MB

    • MD5

      1c164e228395b76537d9c5f3cb6d1e17

    • SHA1

      5a3d0f03dd794f846cb8935d3fef26211b568be6

    • SHA256

      f05feea6a054d056065071fa7082af87dc344af42a02c8f08edac5af6df11d21

    • SHA512

      8375c040b4ce4f2a9b8615f35e6abebe5463be78268ab6564928b546412c09fe28a18bbdfade8c401e8510c70035a8e268f04b6e8b7ea3f469663da0d1bd3406

    • SSDEEP

      6144:W8yAzuf/YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYK:Drzufv

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks