General

  • Target

    f9ec5ae920b6df2fdc1fc070bd598b1a_JaffaCakes118

  • Size

    14.7MB

  • Sample

    240419-khwtcsdh5t

  • MD5

    f9ec5ae920b6df2fdc1fc070bd598b1a

  • SHA1

    798a610c2aa02e0f0b58920a72febd23cae00f64

  • SHA256

    6670134716742f25ab7cfdb33b8c7f0bf13b7d1e91e7874dc20453e4db6ac5d2

  • SHA512

    73976041df720c3dac6fbc9c78bed41ab1ca9e18ffde3c0f4ad8d3e042a02a0b3e2568a1dbca8a6d86ece2ba0a683876af5ca11f9cdd656364c09b450790a6a7

  • SSDEEP

    98304:ONWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllll7:cW

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      f9ec5ae920b6df2fdc1fc070bd598b1a_JaffaCakes118

    • Size

      14.7MB

    • MD5

      f9ec5ae920b6df2fdc1fc070bd598b1a

    • SHA1

      798a610c2aa02e0f0b58920a72febd23cae00f64

    • SHA256

      6670134716742f25ab7cfdb33b8c7f0bf13b7d1e91e7874dc20453e4db6ac5d2

    • SHA512

      73976041df720c3dac6fbc9c78bed41ab1ca9e18ffde3c0f4ad8d3e042a02a0b3e2568a1dbca8a6d86ece2ba0a683876af5ca11f9cdd656364c09b450790a6a7

    • SSDEEP

      98304:ONWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllll7:cW

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks