General

  • Target

    2025-04-24_cf42a51f5f2867ba2f73c8148ece4473_elex_rhadamanthys_smoke-loader

  • Size

    10.4MB

  • Sample

    250424-tnmmba1ly2

  • MD5

    cf42a51f5f2867ba2f73c8148ece4473

  • SHA1

    d486db2e83747c8f715b05c5e1fcbba132ed4bc0

  • SHA256

    6e44dd29eedf37b6b33ee642fa3bfb12d8ddf2d6a8b189e6b1df2d2987138a58

  • SHA512

    713dcd9b8ad9b7db71bab9ff03a33b7ee865f57b131cd8e976f0492e1126f2068837fdcf09a51aad060f38fc604d671ed5426206ca828a604ad1de45dce8427f

  • SSDEEP

    49152:Dzzxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxv:Dz

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-24_cf42a51f5f2867ba2f73c8148ece4473_elex_rhadamanthys_smoke-loader

    • Size

      10.4MB

    • MD5

      cf42a51f5f2867ba2f73c8148ece4473

    • SHA1

      d486db2e83747c8f715b05c5e1fcbba132ed4bc0

    • SHA256

      6e44dd29eedf37b6b33ee642fa3bfb12d8ddf2d6a8b189e6b1df2d2987138a58

    • SHA512

      713dcd9b8ad9b7db71bab9ff03a33b7ee865f57b131cd8e976f0492e1126f2068837fdcf09a51aad060f38fc604d671ed5426206ca828a604ad1de45dce8427f

    • SSDEEP

      49152:Dzzxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxv:Dz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks