General

  • Target

    2025-04-24_631793a37c8765c817f1a620dfa5cc19_amadey_elex_karagany_rhadamanthys_smoke-loader

  • Size

    10.7MB

  • Sample

    250424-t18ejs1p15

  • MD5

    631793a37c8765c817f1a620dfa5cc19

  • SHA1

    2650e4710a306095248bfe863febde5df7db8faf

  • SHA256

    4941f342358a2c4c9a8023b896f35fdc826a4b3afe27824c3422cc667b426fda

  • SHA512

    061cc50fe7b23b1533731d174360f079e3e117a3bc6e72ccb28bace6f3eec7bb2abf17eb81abd96ae5bfce50938c7fde89c231fbeeb8441720782c207da12eca

  • SSDEEP

    6144:y8CHoLztEhfDI8KGNcFwH4wXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIn:y8CHoLOhf0DGNc

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      2025-04-24_631793a37c8765c817f1a620dfa5cc19_amadey_elex_karagany_rhadamanthys_smoke-loader

    • Size

      10.7MB

    • MD5

      631793a37c8765c817f1a620dfa5cc19

    • SHA1

      2650e4710a306095248bfe863febde5df7db8faf

    • SHA256

      4941f342358a2c4c9a8023b896f35fdc826a4b3afe27824c3422cc667b426fda

    • SHA512

      061cc50fe7b23b1533731d174360f079e3e117a3bc6e72ccb28bace6f3eec7bb2abf17eb81abd96ae5bfce50938c7fde89c231fbeeb8441720782c207da12eca

    • SSDEEP

      6144:y8CHoLztEhfDI8KGNcFwH4wXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIn:y8CHoLOhf0DGNc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks