General

  • Target

    2025-03-30_2af6bc030027c4b72c4303d85fe54a19_amadey_rhadamanthys_smoke-loader

  • Size

    10.9MB

  • Sample

    250330-k8e9asxpt5

  • MD5

    2af6bc030027c4b72c4303d85fe54a19

  • SHA1

    cfbafae542f2de7e1fa39521f94b6af47c00eec6

  • SHA256

    a42a6e58fba208fdafadcbe883eba160bde9103eea06a8d29aabc40c6b1a8cfd

  • SHA512

    4d4b7faf11aae0b1ef18b9697abf8cb08ee645acd8927797ec108a86b7dd5c06fed7b682ac3600758e9a2532f87c3521284fc34d9f57c35c99281cbba5d9d053

  • SSDEEP

    3072:zbrmSZiLLReuGpM3fs+QnAIDs+U0CzofG5FL5Vkh0xF7Zq0BTFvFvFvFvFvFvFvf:LiLLsuG+3f/QnAF0CMMUaX

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_2af6bc030027c4b72c4303d85fe54a19_amadey_rhadamanthys_smoke-loader

    • Size

      10.9MB

    • MD5

      2af6bc030027c4b72c4303d85fe54a19

    • SHA1

      cfbafae542f2de7e1fa39521f94b6af47c00eec6

    • SHA256

      a42a6e58fba208fdafadcbe883eba160bde9103eea06a8d29aabc40c6b1a8cfd

    • SHA512

      4d4b7faf11aae0b1ef18b9697abf8cb08ee645acd8927797ec108a86b7dd5c06fed7b682ac3600758e9a2532f87c3521284fc34d9f57c35c99281cbba5d9d053

    • SSDEEP

      3072:zbrmSZiLLReuGpM3fs+QnAIDs+U0CzofG5FL5Vkh0xF7Zq0BTFvFvFvFvFvFvFvf:LiLLsuG+3f/QnAF0CMMUaX

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks