General

  • Target

    65550e023e65942000dcc1c5a111c7ea_JaffaCakes118

  • Size

    13.8MB

  • Sample

    240722-3zmwwswfml

  • MD5

    65550e023e65942000dcc1c5a111c7ea

  • SHA1

    fca59ba6b82b3b8e9d36b8b6be8c9e49868393eb

  • SHA256

    89751a7a1ddea2e417a8d1a5bc3f151bb200b7975021fd5d2f660191566dfeb7

  • SHA512

    86bc3b1707f20c47f3d12886e01d00efcbec20662f0e1287883142c51ae41655e1b3795d2d6dfc62c5a94d734991952002f442cb20d7daf0f075b78e71dfb891

  • SSDEEP

    49152:Tyn7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x3:Ty

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      65550e023e65942000dcc1c5a111c7ea_JaffaCakes118

    • Size

      13.8MB

    • MD5

      65550e023e65942000dcc1c5a111c7ea

    • SHA1

      fca59ba6b82b3b8e9d36b8b6be8c9e49868393eb

    • SHA256

      89751a7a1ddea2e417a8d1a5bc3f151bb200b7975021fd5d2f660191566dfeb7

    • SHA512

      86bc3b1707f20c47f3d12886e01d00efcbec20662f0e1287883142c51ae41655e1b3795d2d6dfc62c5a94d734991952002f442cb20d7daf0f075b78e71dfb891

    • SSDEEP

      49152:Tyn7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x7x3:Ty

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks