General

  • Target

    e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118

  • Size

    14.8MB

  • Sample

    240406-nqwecaaa39

  • MD5

    e273d2961670912cbdbe99b588dc8a6a

  • SHA1

    c9e5f9a212950337db2612cb5b6a78cf4b60086d

  • SHA256

    bf6131ae47a3e2c9b08e6b00591795f10c90bfc46c98dbfe8a56122dfaa35574

  • SHA512

    0801a0d3d02ab1c197aa12b4cbc81022dd786fc9b81aaed1e879ae824919374fe7c4e0c673a69a61a6dac0457da8a4936afdf81ddcc0427478f9ba217219d8f6

  • SSDEEP

    12288:Gc8EvSAInj67ygU57H7zKEVlM++++++++++++++++++++++++++++++++++++++H:G0vSAImHU5

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118

    • Size

      14.8MB

    • MD5

      e273d2961670912cbdbe99b588dc8a6a

    • SHA1

      c9e5f9a212950337db2612cb5b6a78cf4b60086d

    • SHA256

      bf6131ae47a3e2c9b08e6b00591795f10c90bfc46c98dbfe8a56122dfaa35574

    • SHA512

      0801a0d3d02ab1c197aa12b4cbc81022dd786fc9b81aaed1e879ae824919374fe7c4e0c673a69a61a6dac0457da8a4936afdf81ddcc0427478f9ba217219d8f6

    • SSDEEP

      12288:Gc8EvSAInj67ygU57H7zKEVlM++++++++++++++++++++++++++++++++++++++H:G0vSAImHU5

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks