General

  • Target

    023aa226acf2890e914227dab936988c_JaffaCakes118

  • Size

    11.8MB

  • Sample

    240930-tqaersycjf

  • MD5

    023aa226acf2890e914227dab936988c

  • SHA1

    93d78f4bb8d0d12f3390b8d6c2643da373d80bc4

  • SHA256

    a1661500b108adc16b7016f26353aa6dc0bd166694245a7cbb18d477c25cbc1f

  • SHA512

    a492c3fd3e733822468908de6b75894c8cb7794796719c95593a3f9f0d1a33e14d4a8c35e29671f6b95d635cd9c1ea4ead1c1e52902859ab1e65c3f72eef79c9

  • SSDEEP

    6144:Wvk9RADRUv1CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC6:/RAD

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      023aa226acf2890e914227dab936988c_JaffaCakes118

    • Size

      11.8MB

    • MD5

      023aa226acf2890e914227dab936988c

    • SHA1

      93d78f4bb8d0d12f3390b8d6c2643da373d80bc4

    • SHA256

      a1661500b108adc16b7016f26353aa6dc0bd166694245a7cbb18d477c25cbc1f

    • SHA512

      a492c3fd3e733822468908de6b75894c8cb7794796719c95593a3f9f0d1a33e14d4a8c35e29671f6b95d635cd9c1ea4ead1c1e52902859ab1e65c3f72eef79c9

    • SSDEEP

      6144:Wvk9RADRUv1CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC6:/RAD

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks