General

  • Target

    8066071ebc2261fb9fa7bc095950e7a4_JaffaCakes118

  • Size

    142KB

  • Sample

    240529-mbk5dsbc4x

  • MD5

    8066071ebc2261fb9fa7bc095950e7a4

  • SHA1

    385ece42d14ed13dd1911bc78405448f2cc2c5d5

  • SHA256

    9147b2e4d0e04f288700b09606af79a3fdab6b6e8e69495a8ef868481d544beb

  • SHA512

    3b6061ccbc73cc280412177f7569f0af13d14c75425998f043702d97ac33d880ca2d2a21f3fadfa46acb266e82b75d9e2f811122daab48e7dac080bc67fa1511

  • SSDEEP

    3072:LO8/FLfg76rzTkYfiL2+jKfgi4m5nuGFU6W6WN06b37:B9pzwFLnKP46uC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      8066071ebc2261fb9fa7bc095950e7a4_JaffaCakes118

    • Size

      142KB

    • MD5

      8066071ebc2261fb9fa7bc095950e7a4

    • SHA1

      385ece42d14ed13dd1911bc78405448f2cc2c5d5

    • SHA256

      9147b2e4d0e04f288700b09606af79a3fdab6b6e8e69495a8ef868481d544beb

    • SHA512

      3b6061ccbc73cc280412177f7569f0af13d14c75425998f043702d97ac33d880ca2d2a21f3fadfa46acb266e82b75d9e2f811122daab48e7dac080bc67fa1511

    • SSDEEP

      3072:LO8/FLfg76rzTkYfiL2+jKfgi4m5nuGFU6W6WN06b37:B9pzwFLnKP46uC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks