General

  • Target

    7ac7e3c5e937ec52217f11f08670f74b_JaffaCakes118

  • Size

    11.4MB

  • Sample

    241028-zhyqaavlbj

  • MD5

    7ac7e3c5e937ec52217f11f08670f74b

  • SHA1

    2d06048a68a5a6cd48f956645e4d101a2b5b76b5

  • SHA256

    696ba220cd5d19564f0fc05692cdd5a0f0ba2d73ea616c4bc1c49eacbf710f40

  • SHA512

    00206814babfb2df3c2a71173159509c30b27dc1f3a578d18e76b26cf3690e1fbfdc3e165abb5f32813c4ad2ef3247a7aa2bce21414d185f0f249cc07cbdcc3e

  • SSDEEP

    3072:0rLSAaIXFM9X/WWIyOEfEDQMZWecFKmZ:aNWktyH9V

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      7ac7e3c5e937ec52217f11f08670f74b_JaffaCakes118

    • Size

      11.4MB

    • MD5

      7ac7e3c5e937ec52217f11f08670f74b

    • SHA1

      2d06048a68a5a6cd48f956645e4d101a2b5b76b5

    • SHA256

      696ba220cd5d19564f0fc05692cdd5a0f0ba2d73ea616c4bc1c49eacbf710f40

    • SHA512

      00206814babfb2df3c2a71173159509c30b27dc1f3a578d18e76b26cf3690e1fbfdc3e165abb5f32813c4ad2ef3247a7aa2bce21414d185f0f249cc07cbdcc3e

    • SSDEEP

      3072:0rLSAaIXFM9X/WWIyOEfEDQMZWecFKmZ:aNWktyH9V

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks