General

  • Target

    f41d75b14ec54e06280c36e915290f41_JaffaCakes118

  • Size

    10.3MB

  • Sample

    240416-xlr1sshh39

  • MD5

    f41d75b14ec54e06280c36e915290f41

  • SHA1

    afc0c56f74ff4f4b85649463167f562532d3616d

  • SHA256

    9890431d787f9448ed2abe4c371c580c7751577afc5994618bb3b7f852813077

  • SHA512

    7b035781972deea2327d1b0fb841fcd9c02b2ddd14bcbde3c3efcea1a43776c31709111978d983efff36557a75c71d2b74b4ba1188c6ef4709fe3b478948bf0d

  • SSDEEP

    24576:MjY+lg48SlJPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:3HSl

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      f41d75b14ec54e06280c36e915290f41_JaffaCakes118

    • Size

      10.3MB

    • MD5

      f41d75b14ec54e06280c36e915290f41

    • SHA1

      afc0c56f74ff4f4b85649463167f562532d3616d

    • SHA256

      9890431d787f9448ed2abe4c371c580c7751577afc5994618bb3b7f852813077

    • SHA512

      7b035781972deea2327d1b0fb841fcd9c02b2ddd14bcbde3c3efcea1a43776c31709111978d983efff36557a75c71d2b74b4ba1188c6ef4709fe3b478948bf0d

    • SSDEEP

      24576:MjY+lg48SlJPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:3HSl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks