General

  • Target

    2025-03-30_f454f7c0a605f86be6e8f64209e524f1_amadey_rhadamanthys_smoke-loader

  • Size

    12.0MB

  • Sample

    250330-k9w87svycx

  • MD5

    f454f7c0a605f86be6e8f64209e524f1

  • SHA1

    8132eae9d596f0b129e49aba25c410f7eae9ddf9

  • SHA256

    429b30741181c0d2881d7c7f59f2c305e5990a88a8717187108947a5b6fb3b31

  • SHA512

    659372e44e00dd80eda1795a04e773268290bc7f18576d53771e387c2938ea111d12d75f6c45332bf8a3bb3170eb984c1189c6b062eb527b74632051a8dd3796

  • SSDEEP

    3072:klgdKdi5eju5BBJeLjP9SCn2pm0NiHbNsNmBnA/4c:klgdB5eju5QSK2pYRrA/4c

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_f454f7c0a605f86be6e8f64209e524f1_amadey_rhadamanthys_smoke-loader

    • Size

      12.0MB

    • MD5

      f454f7c0a605f86be6e8f64209e524f1

    • SHA1

      8132eae9d596f0b129e49aba25c410f7eae9ddf9

    • SHA256

      429b30741181c0d2881d7c7f59f2c305e5990a88a8717187108947a5b6fb3b31

    • SHA512

      659372e44e00dd80eda1795a04e773268290bc7f18576d53771e387c2938ea111d12d75f6c45332bf8a3bb3170eb984c1189c6b062eb527b74632051a8dd3796

    • SSDEEP

      3072:klgdKdi5eju5BBJeLjP9SCn2pm0NiHbNsNmBnA/4c:klgdB5eju5QSK2pYRrA/4c

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks