General

  • Target

    f93f672e45a5c1129aba812e94192a07_JaffaCakes118

  • Size

    14.4MB

  • Sample

    240419-cbr8laee81

  • MD5

    f93f672e45a5c1129aba812e94192a07

  • SHA1

    595bed5941aa45c13e64f34f370072d28dda19ef

  • SHA256

    592aae666394a3d72e7041676ddd615d31ca54f3a41c3c916580e2692b047ea9

  • SHA512

    32058e8d6b9c3710afa38bf9c9e5fa123cf2442a4de28df09b66ab3ac5fabad998c1bc29a4fec51f9d5dd6dfa80ca5bdb2dad08efca72e1861795cc1d7050632

  • SSDEEP

    49152:+yqI2kmso555555555555555555555555555555555555555555555555555555h:+yqI2

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f93f672e45a5c1129aba812e94192a07_JaffaCakes118

    • Size

      14.4MB

    • MD5

      f93f672e45a5c1129aba812e94192a07

    • SHA1

      595bed5941aa45c13e64f34f370072d28dda19ef

    • SHA256

      592aae666394a3d72e7041676ddd615d31ca54f3a41c3c916580e2692b047ea9

    • SHA512

      32058e8d6b9c3710afa38bf9c9e5fa123cf2442a4de28df09b66ab3ac5fabad998c1bc29a4fec51f9d5dd6dfa80ca5bdb2dad08efca72e1861795cc1d7050632

    • SSDEEP

      49152:+yqI2kmso555555555555555555555555555555555555555555555555555555h:+yqI2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks