General

  • Target

    f8f833d107384d641da35abab88050e3_JaffaCakes118

  • Size

    11.5MB

  • Sample

    240418-29g8qahg38

  • MD5

    f8f833d107384d641da35abab88050e3

  • SHA1

    95d740f7606d93ed86a451a8fbdcec91c0c94bf7

  • SHA256

    46c423ab1e4f0347a402ae2c5a6c90cbf9948ec408502fd3a5f585495dc632ac

  • SHA512

    267268cdd2ddc721c3c830c7935bcf78791d84308ea41df227382c186c3b43c83608407aa9bc039895cda04013a120d0bbc623ccc812e7d11640c0155e719e7c

  • SSDEEP

    24576:jT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRv:dp+

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      f8f833d107384d641da35abab88050e3_JaffaCakes118

    • Size

      11.5MB

    • MD5

      f8f833d107384d641da35abab88050e3

    • SHA1

      95d740f7606d93ed86a451a8fbdcec91c0c94bf7

    • SHA256

      46c423ab1e4f0347a402ae2c5a6c90cbf9948ec408502fd3a5f585495dc632ac

    • SHA512

      267268cdd2ddc721c3c830c7935bcf78791d84308ea41df227382c186c3b43c83608407aa9bc039895cda04013a120d0bbc623ccc812e7d11640c0155e719e7c

    • SSDEEP

      24576:jT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRv:dp+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks