MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cbaf166d5627651d85f09b787ba9768ddd87f0615e651cd3aaf65ef8b1fb280d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Tofsee
Vendor detections: 17
| SHA256 hash: | cbaf166d5627651d85f09b787ba9768ddd87f0615e651cd3aaf65ef8b1fb280d |
|---|---|
| SHA3-384 hash: | c0e26918af7935d2ec407c135618185228c9a20a1b85bdbe6cf7bf087017cd336b655a3ab82c00900385f6d8bebcf86e |
| SHA1 hash: | d63f5189a77af3f779a5206ad7fb01324f223fc5 |
| MD5 hash: | 3445edcd62039254708461f07b2fcb31 |
| humanhash: | black-salami-enemy-muppet |
| File name: | cbaf166d5627651d85f09b787ba9768ddd87f0615e651cd3aaf65ef8b1fb280d |
| Download: | download sample |
| Signature | Tofsee |
| File size: | 14'083'584 bytes |
| First seen: | 2025-04-02 14:29:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fa1d4246e3b102c3e9d9affe19671d22 (1 x DanaBot, 1 x Tofsee) |
| ssdeep | 49152:wllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll3: |
| Threatray | 56 similar samples on MalwareBazaar |
| TLSH | T127E67C34ABFD896AEAF307F099768AF55A3ABCC2E91C415E1414264B3D71E0C4CD136E |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10522/11/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| dhash icon | fcfcf4f4d4d4d8c0 (12 x RedLineStealer, 12 x RaccoonStealer, 3 x Smoke Loader) |
| Reporter | |
| Tags: | exe Tofsee |
Intelligence
File Origin
ITVendor Threat Intelligence
Win.Packed.Lockbit-9919158-0
Win.Dropper.Tofsee-9919472-0
Win.Dropper.Lockbit-9919572-0
Win.Malware.Stopcrypt-9933337-0
Win.Dropper.Tofsee-9934046-0
Win.Dropper.Tofsee-9934861-0
Win.Dropper.Generickdz-9935256-0
Win.Malware.Generic-9935525-0
Win.Malware.Generic-9935807-0
Win.Malware.Generic-9938009-0
Win.Packed.Pwsx-9965185-0
Win.Packed.Bandook-9965180-1
Win.Packer.pkr_ce1a-9980177-0
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
parubey.info
Unpacked files
925c11560a88096bc28480d802d69da132ff883236e0d8dfaf9a367fa07cc245
e142b01c4b04ddca2ffded33fa5e8e3accf2b305021efd57b485cb06f072e84e
3a1e3377c664b6863dda1d7d7ae9c353defc585a6df6eeb1c5147f21d31faaaf
ee87fd0a4b66479135cb2342baaa9fbf54e7dfa4ea65a13a35661a8a2f144663
2c63bf7e8c39671b903cb389c3ec23b73065f338d817bdd3ef3cc89028b5dd4d
a9416f3272c3accd4215cbcbd8af56b6fabe9b05a0ef552e5004edb272ea8abf
0f9a3e60242422bf0a29a4429f7c4321cb98efe0bc61cdba8efc0bc59993fa12
b6e2a4cce6a336b3331f7514ae550ed23690bc5184531e80b33560fda52e0a5a
cbaf166d5627651d85f09b787ba9768ddd87f0615e651cd3aaf65ef8b1fb280d
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_Tofsee |
|---|---|
| Author: | @malgamy12 |
| Description: | Detect_Tofsee |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MALWARE_Win_Grum |
|---|---|
| Author: | ditekSHen |
| Description: | Detect Grum spam bot |
| Rule name: | MALWARE_Win_Tofsee |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Tofsee |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | tofsee_yhub |
|---|---|
| Author: | Billy Austin |
| Description: | Detects Tofsee botnet, also known as Gheg |
| Rule name: | Windows_Trojan_Generic_2993e5a5 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Tofsee_26124fe4 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_tofsee_bot |
|---|---|
| Author: | akrasuski1 |
| Description: | Tofsee malware |
| Rule name: | win_tofsee_w0 |
|---|---|
| Author: | akrasuski1 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleInputW KERNEL32.dll::WriteConsoleW KERNEL32.dll::WriteConsoleA KERNEL32.dll::ReadConsoleW KERNEL32.dll::ReadConsoleInputA KERNEL32.dll::SetConsoleTitleW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateFileA KERNEL32.dll::GetFileAttributesW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::DnsHostnameToComputerNameW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.