General

  • Target

    2025-04-24_8c3b22105706457122f137fad77d6575_amadey_elex_rhadamanthys_smoke-loader

  • Size

    14.4MB

  • Sample

    250424-tg8afawxby

  • MD5

    8c3b22105706457122f137fad77d6575

  • SHA1

    390f179d5688ee3e800929dd9e905c69878793e8

  • SHA256

    dd884b8fc0cf0a97913c60cc0f84a055563ef3faa58392ea398e7eca0b2638ac

  • SHA512

    d2b0712531f980d2ddc3777dbd25470fb6b6e6c38bb8a9fadbdf62a3f88978448880a8500405b60a138566763933db1d30a515448dd381c66326ebb68bb30c6d

  • SSDEEP

    24576:C7NTvtUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUX:IND

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-24_8c3b22105706457122f137fad77d6575_amadey_elex_rhadamanthys_smoke-loader

    • Size

      14.4MB

    • MD5

      8c3b22105706457122f137fad77d6575

    • SHA1

      390f179d5688ee3e800929dd9e905c69878793e8

    • SHA256

      dd884b8fc0cf0a97913c60cc0f84a055563ef3faa58392ea398e7eca0b2638ac

    • SHA512

      d2b0712531f980d2ddc3777dbd25470fb6b6e6c38bb8a9fadbdf62a3f88978448880a8500405b60a138566763933db1d30a515448dd381c66326ebb68bb30c6d

    • SSDEEP

      24576:C7NTvtUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUX:IND

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks