General

  • Target

    27ebcd8b19cb731bd9261b185d134619_JaffaCakes118

  • Size

    13.5MB

  • Sample

    241009-a3h3wsvcrm

  • MD5

    27ebcd8b19cb731bd9261b185d134619

  • SHA1

    677b28d035bd663d7e2933b4ec307606988571f7

  • SHA256

    1a4811320f690e716efa5a7ed56af191595b018e22a94d084eec6e2c28fd2e12

  • SHA512

    660f8925d12b955935c0b3b3f0b5498faca63f43c2673a626ae785a0d0eabaacbbf90a0b222bf6abd73e27f7743fa3a2fe5bfb82907e2cc5a33d41ae67f6b416

  • SSDEEP

    98304:nYTPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPH:n

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      27ebcd8b19cb731bd9261b185d134619_JaffaCakes118

    • Size

      13.5MB

    • MD5

      27ebcd8b19cb731bd9261b185d134619

    • SHA1

      677b28d035bd663d7e2933b4ec307606988571f7

    • SHA256

      1a4811320f690e716efa5a7ed56af191595b018e22a94d084eec6e2c28fd2e12

    • SHA512

      660f8925d12b955935c0b3b3f0b5498faca63f43c2673a626ae785a0d0eabaacbbf90a0b222bf6abd73e27f7743fa3a2fe5bfb82907e2cc5a33d41ae67f6b416

    • SSDEEP

      98304:nYTPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPH:n

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks