General

  • Target

    f57f119b34f2ff7f7770200b1eba0e30_JaffaCakes118

  • Size

    10.3MB

  • Sample

    240417-lsztfabc96

  • MD5

    f57f119b34f2ff7f7770200b1eba0e30

  • SHA1

    ed3398edb4b2dd9fcf7130f573b216c88e038ad9

  • SHA256

    379955aa858a8443401e40f6576aa54c9243fe38d4dd761f41ab0b5847c2a6fc

  • SHA512

    31e75d262af0fc371774bd59287afdb7727ddff3cde18da1df4c0cceca86a23cd0bec60ba3b1c178ae9efea6f8710a729e6da993a30e6d6cb3d1e36a0a561b0a

  • SSDEEP

    49152:i1yvllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll:iA

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f57f119b34f2ff7f7770200b1eba0e30_JaffaCakes118

    • Size

      10.3MB

    • MD5

      f57f119b34f2ff7f7770200b1eba0e30

    • SHA1

      ed3398edb4b2dd9fcf7130f573b216c88e038ad9

    • SHA256

      379955aa858a8443401e40f6576aa54c9243fe38d4dd761f41ab0b5847c2a6fc

    • SHA512

      31e75d262af0fc371774bd59287afdb7727ddff3cde18da1df4c0cceca86a23cd0bec60ba3b1c178ae9efea6f8710a729e6da993a30e6d6cb3d1e36a0a561b0a

    • SSDEEP

      49152:i1yvllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll:iA

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks