General

  • Target

    fc375afd6e19021f99dba8859321d797_JaffaCakes118

  • Size

    14.3MB

  • Sample

    240420-h2zm9abd45

  • MD5

    fc375afd6e19021f99dba8859321d797

  • SHA1

    40ea7fd6cdb00ac865eef58b88baa2a4585275a1

  • SHA256

    55dacf5412f89d111de8f577d2dbc35d8c309651de0b137807efca66e90c6913

  • SHA512

    50aee8181165f0b8e310d4be2ca5f0e5679254443f6a7639c3b878a3ed59b9d22b366ebbd920fff8fcada37da03f3029b7f1e596246f6df7afcae30f65064532

  • SSDEEP

    98304:LNWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllll7:pW

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      fc375afd6e19021f99dba8859321d797_JaffaCakes118

    • Size

      14.3MB

    • MD5

      fc375afd6e19021f99dba8859321d797

    • SHA1

      40ea7fd6cdb00ac865eef58b88baa2a4585275a1

    • SHA256

      55dacf5412f89d111de8f577d2dbc35d8c309651de0b137807efca66e90c6913

    • SHA512

      50aee8181165f0b8e310d4be2ca5f0e5679254443f6a7639c3b878a3ed59b9d22b366ebbd920fff8fcada37da03f3029b7f1e596246f6df7afcae30f65064532

    • SSDEEP

      98304:LNWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllll7:pW

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks