General

  • Target

    2025-03-30_437f4774772119f35bb3028350385af6_amadey_rhadamanthys_smoke-loader

  • Size

    10.6MB

  • Sample

    250330-k96smsvyds

  • MD5

    437f4774772119f35bb3028350385af6

  • SHA1

    1cf78bdcdb449015f41ca0d6e7fc32081591cec4

  • SHA256

    83fcc1ada2ba29218388ebae476780e2d1b60ce6123bffbdca8398688fe037d1

  • SHA512

    58831d413e37cae3ca24f5588390c0ff9eb3ea56207a0615d6c436c00a89bd1cf6117ffeaab718b7d98a947982c60764a2b88ed3ef6b77256adc77a6908f65a6

  • SSDEEP

    3072:cCLVCtykRk5Kws3LQfNeBVe/KyNDrr91m:/eyki5KnUfNeBVe/E

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_437f4774772119f35bb3028350385af6_amadey_rhadamanthys_smoke-loader

    • Size

      10.6MB

    • MD5

      437f4774772119f35bb3028350385af6

    • SHA1

      1cf78bdcdb449015f41ca0d6e7fc32081591cec4

    • SHA256

      83fcc1ada2ba29218388ebae476780e2d1b60ce6123bffbdca8398688fe037d1

    • SHA512

      58831d413e37cae3ca24f5588390c0ff9eb3ea56207a0615d6c436c00a89bd1cf6117ffeaab718b7d98a947982c60764a2b88ed3ef6b77256adc77a6908f65a6

    • SSDEEP

      3072:cCLVCtykRk5Kws3LQfNeBVe/KyNDrr91m:/eyki5KnUfNeBVe/E

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks