General

  • Target

    a0ebdd573ca846bcbe46bba6e5a91355_JaffaCakes118

  • Size

    142KB

  • Sample

    240612-rbysps1emq

  • MD5

    a0ebdd573ca846bcbe46bba6e5a91355

  • SHA1

    640025385f416ea3e0bbce37eb6fb45b6360ba14

  • SHA256

    f5cacd43d8f012962d75c7ea38589b8e974b600c56c0147fd707c7c62ea1c83c

  • SHA512

    acecbe7743475d1260331d6185e79381621a2735618a35195b9b8dc8ff165e019258dd013b1a0f0488f2ee1843c96a2e2c12858a238704398ef27b9ee537036f

  • SSDEEP

    3072:0O8/FLfgf6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:g9dzwFLnKP46uC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      a0ebdd573ca846bcbe46bba6e5a91355_JaffaCakes118

    • Size

      142KB

    • MD5

      a0ebdd573ca846bcbe46bba6e5a91355

    • SHA1

      640025385f416ea3e0bbce37eb6fb45b6360ba14

    • SHA256

      f5cacd43d8f012962d75c7ea38589b8e974b600c56c0147fd707c7c62ea1c83c

    • SHA512

      acecbe7743475d1260331d6185e79381621a2735618a35195b9b8dc8ff165e019258dd013b1a0f0488f2ee1843c96a2e2c12858a238704398ef27b9ee537036f

    • SSDEEP

      3072:0O8/FLfgf6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:g9dzwFLnKP46uC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks