General

  • Target

    fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118

  • Size

    14.6MB

  • Sample

    240420-c2cktsfb2s

  • MD5

    fbbc300be6ec59b88fe78c250e98f0f4

  • SHA1

    e59eae7c8050cc027aad2f6801808ec899527cf5

  • SHA256

    49911d61a324bcfb2722acc8f21c54e093fed68c99989b26bd031298bb84f4b7

  • SHA512

    25f9a3f6fe4a1c7b852c8a9adee66c5a762c0021aa73b6d1bcefb9a811efbc558573955877b4c831ca6204fb3235a724a0dcd6234f8bb82db2a04b59edeb6929

  • SSDEEP

    49152:Sj5555555555555555555555555555555555555555555555555555555555555F:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118

    • Size

      14.6MB

    • MD5

      fbbc300be6ec59b88fe78c250e98f0f4

    • SHA1

      e59eae7c8050cc027aad2f6801808ec899527cf5

    • SHA256

      49911d61a324bcfb2722acc8f21c54e093fed68c99989b26bd031298bb84f4b7

    • SHA512

      25f9a3f6fe4a1c7b852c8a9adee66c5a762c0021aa73b6d1bcefb9a811efbc558573955877b4c831ca6204fb3235a724a0dcd6234f8bb82db2a04b59edeb6929

    • SSDEEP

      49152:Sj5555555555555555555555555555555555555555555555555555555555555F:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks