General

  • Target

    f0f2e1d55b551ec50a83b6ab3bf223ea_JaffaCakes118

  • Size

    12.4MB

  • Sample

    240415-nk2zyafe8w

  • MD5

    f0f2e1d55b551ec50a83b6ab3bf223ea

  • SHA1

    7cac5e9123727d3ac3c345492f90f5f0ade91126

  • SHA256

    6495097a486357eb619562b4229797b959f4125947a73a22610de664563bdf29

  • SHA512

    93d41cb7d33bfb06fa8715ff48727634e30b3fc24eb6f6e88ff7b3aac601168a61c7d3cde97df9ea71d02931a186122f42a4f7d9c03ec808199765945a4ad148

  • SSDEEP

    49152:rj5555555555555555555555555555555555555555555555555555555555555P:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f0f2e1d55b551ec50a83b6ab3bf223ea_JaffaCakes118

    • Size

      12.4MB

    • MD5

      f0f2e1d55b551ec50a83b6ab3bf223ea

    • SHA1

      7cac5e9123727d3ac3c345492f90f5f0ade91126

    • SHA256

      6495097a486357eb619562b4229797b959f4125947a73a22610de664563bdf29

    • SHA512

      93d41cb7d33bfb06fa8715ff48727634e30b3fc24eb6f6e88ff7b3aac601168a61c7d3cde97df9ea71d02931a186122f42a4f7d9c03ec808199765945a4ad148

    • SSDEEP

      49152:rj5555555555555555555555555555555555555555555555555555555555555P:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks