General

  • Target

    fc1d66c4d7ae9e6666b1ada915b7ef47_JaffaCakes118

  • Size

    13.7MB

  • Sample

    240420-g2d6waad94

  • MD5

    fc1d66c4d7ae9e6666b1ada915b7ef47

  • SHA1

    5cb80106721e4d8a0b87eee4a747ec12ca277c90

  • SHA256

    a26ca3465b8713a3686b8c4bb347232255e9ea0e35daed51c8ce1e02fd808e35

  • SHA512

    e34dd1acd21e345d7e8f767971fa4044bef67e7752dfbea952204b4878ae9451c22a8274a10b2b6b085ce781f824b26bc1365429ccb0f45921238498dd57cbd7

  • SSDEEP

    49152:ajrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrP:M

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      fc1d66c4d7ae9e6666b1ada915b7ef47_JaffaCakes118

    • Size

      13.7MB

    • MD5

      fc1d66c4d7ae9e6666b1ada915b7ef47

    • SHA1

      5cb80106721e4d8a0b87eee4a747ec12ca277c90

    • SHA256

      a26ca3465b8713a3686b8c4bb347232255e9ea0e35daed51c8ce1e02fd808e35

    • SHA512

      e34dd1acd21e345d7e8f767971fa4044bef67e7752dfbea952204b4878ae9451c22a8274a10b2b6b085ce781f824b26bc1365429ccb0f45921238498dd57cbd7

    • SSDEEP

      49152:ajrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrP:M

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks