General

  • Target

    2025-04-24_ea106d4dd0a0023ccd510ee7066ed69a_amadey_elex_rhadamanthys_smoke-loader_stealc_tofsee

  • Size

    10.4MB

  • Sample

    250424-vdjncaxydx

  • MD5

    ea106d4dd0a0023ccd510ee7066ed69a

  • SHA1

    6905412cab7d991a60f66d3b8565d36c36379c19

  • SHA256

    352444dafff959cc1aa390421a11ed3990370feadbf7fa61235ee3e07787dbcb

  • SHA512

    f495e338fae0d1e53322b291aab3c175385c2c1eb5e625d84bdbd03f281599c70e039987b22fcb9d9dee6114f0ff4eddfa13c6cb6b024cef3b586f1371dd4a24

  • SSDEEP

    12288:kpe2myy55555555555555555555555555555555555555555555555555555555a:kpsyp

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-24_ea106d4dd0a0023ccd510ee7066ed69a_amadey_elex_rhadamanthys_smoke-loader_stealc_tofsee

    • Size

      10.4MB

    • MD5

      ea106d4dd0a0023ccd510ee7066ed69a

    • SHA1

      6905412cab7d991a60f66d3b8565d36c36379c19

    • SHA256

      352444dafff959cc1aa390421a11ed3990370feadbf7fa61235ee3e07787dbcb

    • SHA512

      f495e338fae0d1e53322b291aab3c175385c2c1eb5e625d84bdbd03f281599c70e039987b22fcb9d9dee6114f0ff4eddfa13c6cb6b024cef3b586f1371dd4a24

    • SSDEEP

      12288:kpe2myy55555555555555555555555555555555555555555555555555555555a:kpsyp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks