General

  • Target

    93a587a1a3f231c7abb57573f000c01b_JaffaCakes118

  • Size

    142KB

  • Sample

    240604-fc4jsseb23

  • MD5

    93a587a1a3f231c7abb57573f000c01b

  • SHA1

    73924fb2fd9587e0fea4c0577e729a647009bd2e

  • SHA256

    ade92047b5c57eca5587d05b35bb98f36a5296fd845201cc4b3d3b284039a82c

  • SHA512

    8bed72bcad6d4c1c20900144f7e329432df514ad4425dc8afd90c7d578b970f4b57ab7c18c8160f03530d9acf81cdc6dddb3439ad057b05563ee2fed9bc661a3

  • SSDEEP

    3072:EO8/FLfgx6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:Q9LzwFLnKP46uC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      93a587a1a3f231c7abb57573f000c01b_JaffaCakes118

    • Size

      142KB

    • MD5

      93a587a1a3f231c7abb57573f000c01b

    • SHA1

      73924fb2fd9587e0fea4c0577e729a647009bd2e

    • SHA256

      ade92047b5c57eca5587d05b35bb98f36a5296fd845201cc4b3d3b284039a82c

    • SHA512

      8bed72bcad6d4c1c20900144f7e329432df514ad4425dc8afd90c7d578b970f4b57ab7c18c8160f03530d9acf81cdc6dddb3439ad057b05563ee2fed9bc661a3

    • SSDEEP

      3072:EO8/FLfgx6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:Q9LzwFLnKP46uC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks