Tofsee
Also known as: Gheg
According to PCrisk, Tofsee (also known as Gheg) is a malicious Trojan-type program that is capable of performing DDoS attacks, mining cryptocurrency, sending emails, stealing various account credentials, updating itself, and more.
Cyber criminals mainly use this program as an email-oriented tool (they target users' email accounts), however, having Tofsee installed can also lead to many other problems.
Last 7 days
- SHAs
- 1
- C2 Total
- 2
- C2 Unique
- 2
- C2 New
- 2
| Date | SHAs | C2 Total | C2 Unique | C2 New |
|---|---|---|---|---|
| Mar 2, 2026 | 1 | 2 | 2 | 2 |
Behavioral Tags
MITRE ATT&CK Techniques
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.
Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.
Adversaries may stop or disable services on a system to render those services unavailable to legitimate users.
Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence.
Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs.
Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms.
Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage.
Adversaries may abuse the Windows service control manager to execute malicious commands or payloads.
Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.
Port Distribution
Further Reading
The spam botnet Tofsee can be divided into three components: loader, core module and plug-ins. Ryan Mi describes how the components communicate with the C&C server, and how they work with one another.
Summary: This was a great find, Terror EK in the wild from malvertising. The landing page appeared to be in the compromised site itself and was not loaded from an iframe, etc. The site just display…