General

  • Target

    fa98677a3baf9cd6e126fcf81016c719_JaffaCakes118

  • Size

    11.9MB

  • Sample

    240419-stfkhsgf5w

  • MD5

    fa98677a3baf9cd6e126fcf81016c719

  • SHA1

    7ae6f29921267db6ed312bcb517eb21b352c318b

  • SHA256

    663a7a322f2bc28669b8f59171613e6b543dfae9c69943be212210e833582f92

  • SHA512

    2b42bc2e90518c32dbbfa56b8daa8a5019975d9979605912aaf00ade0ec6eb608b380c7e008867fdefc94e0aef55334b9e0387aac6f2f675c59bf6b4d575a7d0

  • SSDEEP

    49152:qj5555555555555555555555555555555555555555555555555555555555555D:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      fa98677a3baf9cd6e126fcf81016c719_JaffaCakes118

    • Size

      11.9MB

    • MD5

      fa98677a3baf9cd6e126fcf81016c719

    • SHA1

      7ae6f29921267db6ed312bcb517eb21b352c318b

    • SHA256

      663a7a322f2bc28669b8f59171613e6b543dfae9c69943be212210e833582f92

    • SHA512

      2b42bc2e90518c32dbbfa56b8daa8a5019975d9979605912aaf00ade0ec6eb608b380c7e008867fdefc94e0aef55334b9e0387aac6f2f675c59bf6b4d575a7d0

    • SSDEEP

      49152:qj5555555555555555555555555555555555555555555555555555555555555D:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks