General

  • Target

    fc3952f3e3c67a63a838d5cbf390b675_JaffaCakes118

  • Size

    14.4MB

  • Sample

    240420-h434fsca8v

  • MD5

    fc3952f3e3c67a63a838d5cbf390b675

  • SHA1

    c27d62c6c6382a853603139bd5d179ad77c077b8

  • SHA256

    e254728f6f9e3a2a0e2add68c71cb9901fc89e74518e9bfa5ff65505c217c41c

  • SHA512

    c546ebe17819c78123abbaa198cd55f1d108585596cd1964f594f5dae6e0546d1defdabc76b0c9bea801ccc8de9a8ed2761b477afd3dd8f560a340d407c13708

  • SSDEEP

    98304:Yjhd88888888888888888888888888888888888888888888888888888888888I:Y

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

lazystax.ru

Targets

    • Target

      fc3952f3e3c67a63a838d5cbf390b675_JaffaCakes118

    • Size

      14.4MB

    • MD5

      fc3952f3e3c67a63a838d5cbf390b675

    • SHA1

      c27d62c6c6382a853603139bd5d179ad77c077b8

    • SHA256

      e254728f6f9e3a2a0e2add68c71cb9901fc89e74518e9bfa5ff65505c217c41c

    • SHA512

      c546ebe17819c78123abbaa198cd55f1d108585596cd1964f594f5dae6e0546d1defdabc76b0c9bea801ccc8de9a8ed2761b477afd3dd8f560a340d407c13708

    • SSDEEP

      98304:Yjhd88888888888888888888888888888888888888888888888888888888888I:Y

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks