General

  • Target

    f8f8f55f85bda71bf11ebff2a05cb246_JaffaCakes118

  • Size

    13.6MB

  • Sample

    240418-3agnksah3s

  • MD5

    f8f8f55f85bda71bf11ebff2a05cb246

  • SHA1

    e8e2a9c61150e504a6758ae9f6f7d14a2f1a6fb0

  • SHA256

    7e80e706a130df3f56638f31b6df5868507cfd425349e95301f79c26cbf35fb6

  • SHA512

    5c6c8c92596e081a9f2b3ecae57548451f8fb1de90e49c7b323def60839f8a50abc17ee0b06b84a507287b7096627fa6b74a28146e021e6965ca0d1e673f682b

  • SSDEEP

    49152:v8KGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGi:v8

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      f8f8f55f85bda71bf11ebff2a05cb246_JaffaCakes118

    • Size

      13.6MB

    • MD5

      f8f8f55f85bda71bf11ebff2a05cb246

    • SHA1

      e8e2a9c61150e504a6758ae9f6f7d14a2f1a6fb0

    • SHA256

      7e80e706a130df3f56638f31b6df5868507cfd425349e95301f79c26cbf35fb6

    • SHA512

      5c6c8c92596e081a9f2b3ecae57548451f8fb1de90e49c7b323def60839f8a50abc17ee0b06b84a507287b7096627fa6b74a28146e021e6965ca0d1e673f682b

    • SSDEEP

      49152:v8KGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGi:v8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks