General

  • Target

    2025-03-30_2ed06ba8d9000f25ab5aeec9d4e8f737_mafia_rhadamanthys

  • Size

    12.9MB

  • Sample

    250330-k8ktsaxpt9

  • MD5

    2ed06ba8d9000f25ab5aeec9d4e8f737

  • SHA1

    1b6e0642fc6828d2dd735eac4d08993d86864fa1

  • SHA256

    670cde4531ba475ab70139b3479d559f921052b80f8fdfbce84e29916fa47136

  • SHA512

    4ee58fa95d42670065f74764039c8fab0236bdf27bed84a8269c7ecae401808e77f478d21bd00f6483527045019f41e9cb4157d4b9d1274ad86420c9ccc5d1ea

  • SSDEEP

    6144:dIKjtXz4xIusXQFUgRUkBP56ItZa5fH4Vds9:GOtXkxNIQFUgykBoMZa5fyC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_2ed06ba8d9000f25ab5aeec9d4e8f737_mafia_rhadamanthys

    • Size

      12.9MB

    • MD5

      2ed06ba8d9000f25ab5aeec9d4e8f737

    • SHA1

      1b6e0642fc6828d2dd735eac4d08993d86864fa1

    • SHA256

      670cde4531ba475ab70139b3479d559f921052b80f8fdfbce84e29916fa47136

    • SHA512

      4ee58fa95d42670065f74764039c8fab0236bdf27bed84a8269c7ecae401808e77f478d21bd00f6483527045019f41e9cb4157d4b9d1274ad86420c9ccc5d1ea

    • SSDEEP

      6144:dIKjtXz4xIusXQFUgRUkBP56ItZa5fH4Vds9:GOtXkxNIQFUgykBoMZa5fyC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.