General

  • Target

    f122f635a864979a7315fa6d1e9231a4_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240415-qfg53she3s

  • MD5

    f122f635a864979a7315fa6d1e9231a4

  • SHA1

    90640f6b3f78c5a7d28745141da2683ad57cd644

  • SHA256

    6262f1a00797487508da38932d42893bf4bdd3805315f8da761105ee38c744cc

  • SHA512

    6d5499c1ef6d3b3647da105f08bd52affcedf5d47193b55d5025394a7f71033757c5ea530880db98a56881b776ac7a1f83edcaa0f9700814ee5a9bf82540fa08

  • SSDEEP

    49152:13SkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkU:13

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      f122f635a864979a7315fa6d1e9231a4_JaffaCakes118

    • Size

      11.6MB

    • MD5

      f122f635a864979a7315fa6d1e9231a4

    • SHA1

      90640f6b3f78c5a7d28745141da2683ad57cd644

    • SHA256

      6262f1a00797487508da38932d42893bf4bdd3805315f8da761105ee38c744cc

    • SHA512

      6d5499c1ef6d3b3647da105f08bd52affcedf5d47193b55d5025394a7f71033757c5ea530880db98a56881b776ac7a1f83edcaa0f9700814ee5a9bf82540fa08

    • SSDEEP

      49152:13SkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkU:13

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks