General

  • Target

    fb3e27d3a1c7970ab760ce424ae1baf3_JaffaCakes118

  • Size

    10.5MB

  • Sample

    240419-1qtlzage37

  • MD5

    fb3e27d3a1c7970ab760ce424ae1baf3

  • SHA1

    35068cd79a368496ff016e9744f5bfc5b46243a4

  • SHA256

    fa409a4ec066822a97f2e0b0e47a7f4ce9ea3d60025047252511719856cbbd4b

  • SHA512

    d02ff43ad01b2c7d8247efe13a2015c908e4e90b710580c1ef5fe15ac016703c14c20dbcbc62c68567f0656aea00f4d421da40e0f86d6ce17ae867fe73d81277

  • SSDEEP

    49152:LRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBL:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      fb3e27d3a1c7970ab760ce424ae1baf3_JaffaCakes118

    • Size

      10.5MB

    • MD5

      fb3e27d3a1c7970ab760ce424ae1baf3

    • SHA1

      35068cd79a368496ff016e9744f5bfc5b46243a4

    • SHA256

      fa409a4ec066822a97f2e0b0e47a7f4ce9ea3d60025047252511719856cbbd4b

    • SHA512

      d02ff43ad01b2c7d8247efe13a2015c908e4e90b710580c1ef5fe15ac016703c14c20dbcbc62c68567f0656aea00f4d421da40e0f86d6ce17ae867fe73d81277

    • SSDEEP

      49152:LRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBL:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks