← Back to SOC feed Coverage →

ThreatFox: Tofsee IOCs

ioc-hunt HIGH ThreatFox
CommonSecurityLogDeviceNetworkEvents
iocthreatfoxwin-tofsee
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-21T11:00:00Z · Confidence: high

Hunt Hypothesis

The ThreatFox: Tofsee IOCs rule detects potential adversary activity linked to the Tofsee threat group, which is associated with high-severity malicious campaigns. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage compromises from advanced persistent threats.

IOC Summary

Malware Family: Tofsee Total IOCs: 4 IOC Types: ip:port

TypeValueThreat TypeFirst SeenConfidence
ip:port217[.]60[.]241[.]100:418botnet_cc2026-05-2175%
ip:port217[.]60[.]241[.]17:418botnet_cc2026-05-2175%
ip:port64[.]89[.]161[.]178:482botnet_cc2026-05-2175%
ip:port83[.]142[.]209[.]228:418botnet_cc2026-05-2175%

KQL: Ip Hunt

// Hunt for network connections to known malicious IPs
// Source: ThreatFox - Tofsee
let malicious_ips = dynamic(["83.142.209.228", "64.89.161.178", "217.60.241.100", "217.60.241.17"]);
CommonSecurityLog
| where DestinationIP in (malicious_ips) or SourceIP in (malicious_ips)
| project TimeGenerated, SourceIP, DestinationIP, DestinationPort, DeviceAction, Activity
| order by TimeGenerated desc

KQL: Ip Hunt Device

// Hunt in Defender for Endpoint network events
let malicious_ips = dynamic(["83.142.209.228", "64.89.161.178", "217.60.241.100", "217.60.241.17"]);
DeviceNetworkEvents
| where RemoteIP in (malicious_ips)
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName, ActionType
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DeviceNetworkEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.tofsee/