General

  • Target

    feddd618ad261223fa56a9a90c85b16d_JaffaCakes118

  • Size

    14.2MB

  • Sample

    240421-kc7nnsfa47

  • MD5

    feddd618ad261223fa56a9a90c85b16d

  • SHA1

    c52277afeab4974e09f04817d4312b19e62a7a4c

  • SHA256

    2d9b24d71fc9718cc923f30729423817aa1c3547b27ff086e0d173d132932c7d

  • SHA512

    af5071941f7508e01b6ef14a15bfdece43143af28d15f11d577cf0d544f67db626d9ddeff35f5dff2cbb194eec8e97debf670228c90c6807e50caca6eecda30c

  • SSDEEP

    196608:CV8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY3:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      feddd618ad261223fa56a9a90c85b16d_JaffaCakes118

    • Size

      14.2MB

    • MD5

      feddd618ad261223fa56a9a90c85b16d

    • SHA1

      c52277afeab4974e09f04817d4312b19e62a7a4c

    • SHA256

      2d9b24d71fc9718cc923f30729423817aa1c3547b27ff086e0d173d132932c7d

    • SHA512

      af5071941f7508e01b6ef14a15bfdece43143af28d15f11d577cf0d544f67db626d9ddeff35f5dff2cbb194eec8e97debf670228c90c6807e50caca6eecda30c

    • SSDEEP

      196608:CV8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks