General

  • Target

    2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys

  • Size

    14.9MB

  • Sample

    250330-zv677aw1ft

  • MD5

    8fae0351e92916053681e654ab099267

  • SHA1

    da74e342fdd5c80d3b34e04f74369fcc088daa64

  • SHA256

    b8e3d9a36d04a45c9cde5ae9f53d6fb709e599eee11a7396b9e2216fb7cb733d

  • SHA512

    fb468556e5a71977e8cccb0a0f3680cfca513f823d1d3bc752776c26b920533165650d734aa2e18d9eed7c86eae9e3ed49e47e8584a54d816ae758a86d5b38a2

  • SSDEEP

    49152:sLFuiE8888888888888888888888888888888888888888888888888888888888:sLM

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys

    • Size

      14.9MB

    • MD5

      8fae0351e92916053681e654ab099267

    • SHA1

      da74e342fdd5c80d3b34e04f74369fcc088daa64

    • SHA256

      b8e3d9a36d04a45c9cde5ae9f53d6fb709e599eee11a7396b9e2216fb7cb733d

    • SHA512

      fb468556e5a71977e8cccb0a0f3680cfca513f823d1d3bc752776c26b920533165650d734aa2e18d9eed7c86eae9e3ed49e47e8584a54d816ae758a86d5b38a2

    • SSDEEP

      49152:sLFuiE8888888888888888888888888888888888888888888888888888888888:sLM

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks