General

  • Target

    0866bfed4e41dc6490faa8c4d149d42e_JaffaCakes118

  • Size

    10.0MB

  • Sample

    241002-cpgn1swcje

  • MD5

    0866bfed4e41dc6490faa8c4d149d42e

  • SHA1

    9f3409b0408c9573beeadd30c4ed7d5c95e7d1d2

  • SHA256

    eca59671c5b27920d3194bf8367a55c451a8aa6f78eb0b6dc5400fd0bec9e531

  • SHA512

    2b3cd6e677751de715c603624e51fa2eec754ec1c75baf5ff303f6e0c64b5d01f5c1290fcae8ec97fb917d52ab7ad5c5a03b07313994b192cd74552e465f1ec6

  • SSDEEP

    49152:CMeuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuH:C

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      0866bfed4e41dc6490faa8c4d149d42e_JaffaCakes118

    • Size

      10.0MB

    • MD5

      0866bfed4e41dc6490faa8c4d149d42e

    • SHA1

      9f3409b0408c9573beeadd30c4ed7d5c95e7d1d2

    • SHA256

      eca59671c5b27920d3194bf8367a55c451a8aa6f78eb0b6dc5400fd0bec9e531

    • SHA512

      2b3cd6e677751de715c603624e51fa2eec754ec1c75baf5ff303f6e0c64b5d01f5c1290fcae8ec97fb917d52ab7ad5c5a03b07313994b192cd74552e465f1ec6

    • SSDEEP

      49152:CMeuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuH:C

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks