General

  • Target

    f5fc0244fac4d1134685531500b89a07_JaffaCakes118

  • Size

    11.7MB

  • Sample

    240417-rtqj2sca36

  • MD5

    f5fc0244fac4d1134685531500b89a07

  • SHA1

    5e378f0c50c6680eb17f41939ea0e2859a16cf46

  • SHA256

    914014bdfa54711f0be7ff00b7438aa023468c87494e7ec207ae9f3e543f3d69

  • SHA512

    f1d3e9924913692e495c3268814202b6d6c6598cdbcde0b21f9b34f058a25ef744f8bc814bb7a2df1c73ea25a659e7a1ed2bd77b9be83742e0870875b334c769

  • SSDEEP

    12288:TRXQK44fy611111111111111111111111111111111111111111111111111111H:TRx2

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f5fc0244fac4d1134685531500b89a07_JaffaCakes118

    • Size

      11.7MB

    • MD5

      f5fc0244fac4d1134685531500b89a07

    • SHA1

      5e378f0c50c6680eb17f41939ea0e2859a16cf46

    • SHA256

      914014bdfa54711f0be7ff00b7438aa023468c87494e7ec207ae9f3e543f3d69

    • SHA512

      f1d3e9924913692e495c3268814202b6d6c6598cdbcde0b21f9b34f058a25ef744f8bc814bb7a2df1c73ea25a659e7a1ed2bd77b9be83742e0870875b334c769

    • SSDEEP

      12288:TRXQK44fy611111111111111111111111111111111111111111111111111111H:TRx2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks