General

  • Target

    fe1a54e652e0aabbeef12672ab7cd8b6_JaffaCakes118

  • Size

    12.5MB

  • Sample

    240421-bspclaff7t

  • MD5

    fe1a54e652e0aabbeef12672ab7cd8b6

  • SHA1

    ade9b1b9a4cffb7273e0d4658c46e4b96da074cb

  • SHA256

    4862a24b71b2b82a87363c6e8f76784c96fca5a5285611387c8c012928206445

  • SHA512

    fc5f7260a03670a45105b77e4eab17cd784f43fc689e8c7314848f08cabbefcd833cef6e42736585dcd8af54d0642db4249e70ffd6b7b6153dcbe09bf97f41e0

  • SSDEEP

    49152:oM+SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSz:o

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      fe1a54e652e0aabbeef12672ab7cd8b6_JaffaCakes118

    • Size

      12.5MB

    • MD5

      fe1a54e652e0aabbeef12672ab7cd8b6

    • SHA1

      ade9b1b9a4cffb7273e0d4658c46e4b96da074cb

    • SHA256

      4862a24b71b2b82a87363c6e8f76784c96fca5a5285611387c8c012928206445

    • SHA512

      fc5f7260a03670a45105b77e4eab17cd784f43fc689e8c7314848f08cabbefcd833cef6e42736585dcd8af54d0642db4249e70ffd6b7b6153dcbe09bf97f41e0

    • SSDEEP

      49152:oM+SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSz:o

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks