General

  • Target

    2025-04-04_e08bc2293bdeba0df986355ce62864ee_amadey_rhadamanthys_smoke-loader

  • Size

    11.5MB

  • Sample

    250404-g2gl1a1xb1

  • MD5

    e08bc2293bdeba0df986355ce62864ee

  • SHA1

    e53cb1919f970f511eb6c1a4b6b6b2a0f2c4040f

  • SHA256

    ada07f035ad940ba06214f02ab3e66513443530d6b1dce33ddc20829bd028408

  • SHA512

    5df0154cf1c916a9773d8bc2fdb2e7ce400c966022561e7df4861a4aadf8e77dc308b381ed8fed96f65e5a24e5371cbcc4b504d98573ac393c0180a8ef80093a

  • SSDEEP

    3072:BUYC9q24pkJimkGgbdGz9uIYogXFYfKkqCZB8h0e2R10JKuC5PsFRRRRRRRRRRRn:BUYgq6krsz9Ti1h0eSuJ4s

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-04_e08bc2293bdeba0df986355ce62864ee_amadey_rhadamanthys_smoke-loader

    • Size

      11.5MB

    • MD5

      e08bc2293bdeba0df986355ce62864ee

    • SHA1

      e53cb1919f970f511eb6c1a4b6b6b2a0f2c4040f

    • SHA256

      ada07f035ad940ba06214f02ab3e66513443530d6b1dce33ddc20829bd028408

    • SHA512

      5df0154cf1c916a9773d8bc2fdb2e7ce400c966022561e7df4861a4aadf8e77dc308b381ed8fed96f65e5a24e5371cbcc4b504d98573ac393c0180a8ef80093a

    • SSDEEP

      3072:BUYC9q24pkJimkGgbdGz9uIYogXFYfKkqCZB8h0e2R10JKuC5PsFRRRRRRRRRRRn:BUYgq6krsz9Ti1h0eSuJ4s

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.