General

  • Target

    f21f4614358cdb18bcc75489077f6e50_JaffaCakes118

  • Size

    13.1MB

  • Sample

    240415-2yzcvsaf26

  • MD5

    f21f4614358cdb18bcc75489077f6e50

  • SHA1

    3fbcc2f1bd4dce604cfb468ef882ce93388f1015

  • SHA256

    7a975f0197744ff65ed0c6ab56576c5b40bf11176e6f43f9945072a9bb3660e0

  • SHA512

    95f8f87568983cc69a13b4d023520364e52ceb241474aeb1bd4a91b59d483b002653c15b0bb6b9b8aff76f363a305aabc03872696440f76f0e2e1e71431583c5

  • SSDEEP

    49152:Yjrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrj:e

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f21f4614358cdb18bcc75489077f6e50_JaffaCakes118

    • Size

      13.1MB

    • MD5

      f21f4614358cdb18bcc75489077f6e50

    • SHA1

      3fbcc2f1bd4dce604cfb468ef882ce93388f1015

    • SHA256

      7a975f0197744ff65ed0c6ab56576c5b40bf11176e6f43f9945072a9bb3660e0

    • SHA512

      95f8f87568983cc69a13b4d023520364e52ceb241474aeb1bd4a91b59d483b002653c15b0bb6b9b8aff76f363a305aabc03872696440f76f0e2e1e71431583c5

    • SSDEEP

      49152:Yjrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrj:e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks