General

  • Target

    ffa470cbfce681b6f27abc2b87469f19_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240421-tdhklsee94

  • MD5

    ffa470cbfce681b6f27abc2b87469f19

  • SHA1

    65871c2c0aea1d37092757678f0f9a7e2e2407f2

  • SHA256

    9b2631f5c99866630dd888cf3f9f19a016c1ca94f759fb4943ceb337dbe9d10c

  • SHA512

    ea45f99101473888a022e87b16c651f513e8e1b03675e217f17d722e3cc9329381a0587a8ad5ba8142c1f1649042e25689c43c32b0d68ece0373bf6cefee6dd7

  • SSDEEP

    98304:eNWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllp:sW

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      ffa470cbfce681b6f27abc2b87469f19_JaffaCakes118

    • Size

      11.4MB

    • MD5

      ffa470cbfce681b6f27abc2b87469f19

    • SHA1

      65871c2c0aea1d37092757678f0f9a7e2e2407f2

    • SHA256

      9b2631f5c99866630dd888cf3f9f19a016c1ca94f759fb4943ceb337dbe9d10c

    • SHA512

      ea45f99101473888a022e87b16c651f513e8e1b03675e217f17d722e3cc9329381a0587a8ad5ba8142c1f1649042e25689c43c32b0d68ece0373bf6cefee6dd7

    • SSDEEP

      98304:eNWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllp:sW

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks