General

  • Target

    ffbb54a4781fbcedc8cf2838defba14c_JaffaCakes118

  • Size

    13.6MB

  • Sample

    240421-vagpksfd54

  • MD5

    ffbb54a4781fbcedc8cf2838defba14c

  • SHA1

    33b8f837b0439ee56351cda361d8dcafa40e6574

  • SHA256

    e982349cdd6908329e1c5163572103361fce17904dcbf5a820ca057553ebb74c

  • SHA512

    f59e3cc49c0d630a89f37cacce2b4ea326ca99db1e0e299dee131db365512554d4d0361ea19ee5fc1637b5cf5df9462097929f78d6e4f6c355161372dd31fcb2

  • SSDEEP

    98304:8jhd88888888888888888888888888888888888888888888888888888888888/:8

Malware Config

Extracted

Family

tofsee

C2

176.111.174.19

lazystax.ru

Targets

    • Target

      ffbb54a4781fbcedc8cf2838defba14c_JaffaCakes118

    • Size

      13.6MB

    • MD5

      ffbb54a4781fbcedc8cf2838defba14c

    • SHA1

      33b8f837b0439ee56351cda361d8dcafa40e6574

    • SHA256

      e982349cdd6908329e1c5163572103361fce17904dcbf5a820ca057553ebb74c

    • SHA512

      f59e3cc49c0d630a89f37cacce2b4ea326ca99db1e0e299dee131db365512554d4d0361ea19ee5fc1637b5cf5df9462097929f78d6e4f6c355161372dd31fcb2

    • SSDEEP

      98304:8jhd88888888888888888888888888888888888888888888888888888888888/:8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks