General

  • Target

    f9c439a23d0f75c7943a026ea48d0847_JaffaCakes118

  • Size

    10.4MB

  • Sample

    240419-hv3rbsbe46

  • MD5

    f9c439a23d0f75c7943a026ea48d0847

  • SHA1

    ce770c46965b40fb20baf9d505460cd32dd9a039

  • SHA256

    46ae28c9e478a566cf6b803f2abc498eeaeb6b579e81067a8a26d8669e930dd0

  • SHA512

    db1f56477c9a1a13922a8de7255003f8ef25be035cf24b28f98b1c4bf287d05f6b6ded2fb1f7167dd46c539deaa3d8ef3177a1d7d7da74cfce8fe931de137aa5

  • SSDEEP

    196608:3vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvm:3vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvm

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f9c439a23d0f75c7943a026ea48d0847_JaffaCakes118

    • Size

      10.4MB

    • MD5

      f9c439a23d0f75c7943a026ea48d0847

    • SHA1

      ce770c46965b40fb20baf9d505460cd32dd9a039

    • SHA256

      46ae28c9e478a566cf6b803f2abc498eeaeb6b579e81067a8a26d8669e930dd0

    • SHA512

      db1f56477c9a1a13922a8de7255003f8ef25be035cf24b28f98b1c4bf287d05f6b6ded2fb1f7167dd46c539deaa3d8ef3177a1d7d7da74cfce8fe931de137aa5

    • SSDEEP

      196608:3vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvm:3vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvm

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks