General

  • Target

    9484d5c263bbb436280dc8c8c1872e44_JaffaCakes118

  • Size

    142KB

  • Sample

    240604-mnsp1aea53

  • MD5

    9484d5c263bbb436280dc8c8c1872e44

  • SHA1

    a7e0a7a440f7fdb7f59bfc02a3fd5a01391e9786

  • SHA256

    4a65362140edf6266596e78a1b3617381d9e6654310eee10aa5206e364b73bc7

  • SHA512

    230774d0112ea62d6821d9672a8906be05251018e9ef193c5695c72afd409e8b718e95c7d4645b2317346d2484852ab47157a4b046ba10aa2114af8ff816c99a

  • SSDEEP

    3072:NO8/FLfg16rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3A:X9rzwFLnKP46uC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      9484d5c263bbb436280dc8c8c1872e44_JaffaCakes118

    • Size

      142KB

    • MD5

      9484d5c263bbb436280dc8c8c1872e44

    • SHA1

      a7e0a7a440f7fdb7f59bfc02a3fd5a01391e9786

    • SHA256

      4a65362140edf6266596e78a1b3617381d9e6654310eee10aa5206e364b73bc7

    • SHA512

      230774d0112ea62d6821d9672a8906be05251018e9ef193c5695c72afd409e8b718e95c7d4645b2317346d2484852ab47157a4b046ba10aa2114af8ff816c99a

    • SSDEEP

      3072:NO8/FLfg16rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3A:X9rzwFLnKP46uC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks