General

  • Target

    fa05c055fc43c8c597197b590670ca85_JaffaCakes118

  • Size

    13.6MB

  • Sample

    240419-lmmxpadh88

  • MD5

    fa05c055fc43c8c597197b590670ca85

  • SHA1

    8b4e076dd4f300a82a21e255e14413737b575b4c

  • SHA256

    c0aea4faca6ebef23d42c4daa61585c835aaa69cb819a29bf67b03881469bf04

  • SHA512

    1455a615d3a8b3b0d50350da785784baf830f3b3b10cabaa19c7d97a112a3334fbcc0e5a0883b3fa77135f1f173185a83c44f7d113f82b21000e9fa6ca090798

  • SSDEEP

    49152:KR88888888888888888888888888888888888888888888888888888888888884:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      fa05c055fc43c8c597197b590670ca85_JaffaCakes118

    • Size

      13.6MB

    • MD5

      fa05c055fc43c8c597197b590670ca85

    • SHA1

      8b4e076dd4f300a82a21e255e14413737b575b4c

    • SHA256

      c0aea4faca6ebef23d42c4daa61585c835aaa69cb819a29bf67b03881469bf04

    • SHA512

      1455a615d3a8b3b0d50350da785784baf830f3b3b10cabaa19c7d97a112a3334fbcc0e5a0883b3fa77135f1f173185a83c44f7d113f82b21000e9fa6ca090798

    • SSDEEP

      49152:KR88888888888888888888888888888888888888888888888888888888888884:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks