General

  • Target

    04e17a3cf981140f0babf1eba3b1a30a_JaffaCakes118

  • Size

    11.3MB

  • Sample

    240428-lgbx8sch4z

  • MD5

    04e17a3cf981140f0babf1eba3b1a30a

  • SHA1

    1d72cbeadca5d725f63dc51e8bbcb8ec1af5805c

  • SHA256

    447e116c206c6b28e3447d54d271eba35db13bae7edaa673cfa9cc207db05ea7

  • SHA512

    8095d51b0ec02e2528c38b7770758aef4d3b8106cd0dce4912dcedb32d7d88d980e38e66474116d3a55d9955044d4f9f8dbf8ee96154982a24ee2065f262e7fb

  • SSDEEP

    6144:j5VCb4QuzFRpIozzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz7:F8NKFRp

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      04e17a3cf981140f0babf1eba3b1a30a_JaffaCakes118

    • Size

      11.3MB

    • MD5

      04e17a3cf981140f0babf1eba3b1a30a

    • SHA1

      1d72cbeadca5d725f63dc51e8bbcb8ec1af5805c

    • SHA256

      447e116c206c6b28e3447d54d271eba35db13bae7edaa673cfa9cc207db05ea7

    • SHA512

      8095d51b0ec02e2528c38b7770758aef4d3b8106cd0dce4912dcedb32d7d88d980e38e66474116d3a55d9955044d4f9f8dbf8ee96154982a24ee2065f262e7fb

    • SSDEEP

      6144:j5VCb4QuzFRpIozzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz7:F8NKFRp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks