General

  • Target

    ff4f7325080218c8d7dc46bb6bc646f0_JaffaCakes118

  • Size

    14.9MB

  • Sample

    240421-p2c8kscb7w

  • MD5

    ff4f7325080218c8d7dc46bb6bc646f0

  • SHA1

    85d94a850a8521727e3e0141cbd96770f486f195

  • SHA256

    db29532b00f98cfbaf582b34fdf5725ffe0db23a1b0dc6c8aabcf947bd4c1fbe

  • SHA512

    c7029c15430f0d9b3f9d9b7f2652f7f21d52a1454386cba515b933745b69749d6d80664ea0de9846c89c15b1568aafbef408c53183b67caab3863eb693aa6a30

  • SSDEEP

    98304:djhd88888888888888888888888888888888888888888888888888888888888X:d

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

lazystax.ru

Targets

    • Target

      ff4f7325080218c8d7dc46bb6bc646f0_JaffaCakes118

    • Size

      14.9MB

    • MD5

      ff4f7325080218c8d7dc46bb6bc646f0

    • SHA1

      85d94a850a8521727e3e0141cbd96770f486f195

    • SHA256

      db29532b00f98cfbaf582b34fdf5725ffe0db23a1b0dc6c8aabcf947bd4c1fbe

    • SHA512

      c7029c15430f0d9b3f9d9b7f2652f7f21d52a1454386cba515b933745b69749d6d80664ea0de9846c89c15b1568aafbef408c53183b67caab3863eb693aa6a30

    • SSDEEP

      98304:djhd88888888888888888888888888888888888888888888888888888888888X:d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks