General

  • Target

    79214841917d19ed5226a021dd2d8c7d_JaffaCakes118

  • Size

    120KB

  • Sample

    240527-pg5r4acg54

  • MD5

    79214841917d19ed5226a021dd2d8c7d

  • SHA1

    48082025c975b8e060ed37fac928df5ebcd6375f

  • SHA256

    7e8a5dedb5852ba8f9f3970c0204657611bb7b3e8009c019e7105b7528111403

  • SHA512

    8f82b620de851ee6bc45d77aa01b0fc9876c2168319b3fd78bc08cb0a01871238e755b266e6413fe8c464d32d5d3bd7b32600752c3be55a9eb9281c4008a9fe5

  • SSDEEP

    3072:tOLuSAK9akBThPFu6wJnpo33ebEvTHM4O:wE2aiFkJnpjbEjM4

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      79214841917d19ed5226a021dd2d8c7d_JaffaCakes118

    • Size

      120KB

    • MD5

      79214841917d19ed5226a021dd2d8c7d

    • SHA1

      48082025c975b8e060ed37fac928df5ebcd6375f

    • SHA256

      7e8a5dedb5852ba8f9f3970c0204657611bb7b3e8009c019e7105b7528111403

    • SHA512

      8f82b620de851ee6bc45d77aa01b0fc9876c2168319b3fd78bc08cb0a01871238e755b266e6413fe8c464d32d5d3bd7b32600752c3be55a9eb9281c4008a9fe5

    • SSDEEP

      3072:tOLuSAK9akBThPFu6wJnpo33ebEvTHM4O:wE2aiFkJnpjbEjM4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks