General

  • Target

    2025-04-24_ff19bf96f074fdcfb228e53c7c0f7819_elex_rhadamanthys_smoke-loader

  • Size

    13.1MB

  • Sample

    250424-vgyaxaxzhv

  • MD5

    ff19bf96f074fdcfb228e53c7c0f7819

  • SHA1

    f05f383ccf81984dc4e471749196d13ad756b5d4

  • SHA256

    0755a4018d328fc72dc6242b60248e7fbb7f00a8972642c24c25def732a8d362

  • SHA512

    0cd49b41152f862b15503714b99dcd3c72e44422d1a1f2e3c11e9f1e02293a397bdcf744037e686d0223fb7e8bbd98213ad381a34e1e65d672b54056b9452376

  • SSDEEP

    49152:LqL7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7IY:L

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-04-24_ff19bf96f074fdcfb228e53c7c0f7819_elex_rhadamanthys_smoke-loader

    • Size

      13.1MB

    • MD5

      ff19bf96f074fdcfb228e53c7c0f7819

    • SHA1

      f05f383ccf81984dc4e471749196d13ad756b5d4

    • SHA256

      0755a4018d328fc72dc6242b60248e7fbb7f00a8972642c24c25def732a8d362

    • SHA512

      0cd49b41152f862b15503714b99dcd3c72e44422d1a1f2e3c11e9f1e02293a397bdcf744037e686d0223fb7e8bbd98213ad381a34e1e65d672b54056b9452376

    • SSDEEP

      49152:LqL7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7I7IY:L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks