General

  • Target

    edbbf08e3dd8f8530009a66ac0b32fb4_JaffaCakes118

  • Size

    11.9MB

  • Sample

    240411-srwtqaec44

  • MD5

    edbbf08e3dd8f8530009a66ac0b32fb4

  • SHA1

    5c3680f4b1ad1cb28b5616b2ea09b61d6d2f7d26

  • SHA256

    e25a7af92f26b3f549c112bfaba1fcf3a1f7b2f9f6a9fc2b0d8cc97bd25dc22b

  • SHA512

    29e7bbd44cb84542c7b754a7ee56b84b9dd9ace17befae3ac0507f42a1262a1f185211a1d21f664821dd9370ef58237541d86a36b422a2ecbd6207cb59b081dd

  • SSDEEP

    196608:Azzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz7:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      edbbf08e3dd8f8530009a66ac0b32fb4_JaffaCakes118

    • Size

      11.9MB

    • MD5

      edbbf08e3dd8f8530009a66ac0b32fb4

    • SHA1

      5c3680f4b1ad1cb28b5616b2ea09b61d6d2f7d26

    • SHA256

      e25a7af92f26b3f549c112bfaba1fcf3a1f7b2f9f6a9fc2b0d8cc97bd25dc22b

    • SHA512

      29e7bbd44cb84542c7b754a7ee56b84b9dd9ace17befae3ac0507f42a1262a1f185211a1d21f664821dd9370ef58237541d86a36b422a2ecbd6207cb59b081dd

    • SSDEEP

      196608:Azzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz7:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks