General

  • Target

    82a6162642e7011415a35b89c52dcd9b_JaffaCakes118

  • Size

    11.1MB

  • Sample

    241031-lty9asweqn

  • MD5

    82a6162642e7011415a35b89c52dcd9b

  • SHA1

    aba7845a594b2363f131e03d8d81060031c6fbb2

  • SHA256

    8190306001ddb5a81596b49253258638c1ff2040cb62de7515025b1446f46be9

  • SHA512

    c4cde32813dff4592733edb06af94575b514e05a7280c566912b7dba1380956d09a7a8d78ce6d69a9f10facb09bab1a5bf00da1128f4d21fe1fd629929f8dfd1

  • SSDEEP

    12288:6ffRLpsONV6+uOaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaf:6f5fNV6+

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      82a6162642e7011415a35b89c52dcd9b_JaffaCakes118

    • Size

      11.1MB

    • MD5

      82a6162642e7011415a35b89c52dcd9b

    • SHA1

      aba7845a594b2363f131e03d8d81060031c6fbb2

    • SHA256

      8190306001ddb5a81596b49253258638c1ff2040cb62de7515025b1446f46be9

    • SHA512

      c4cde32813dff4592733edb06af94575b514e05a7280c566912b7dba1380956d09a7a8d78ce6d69a9f10facb09bab1a5bf00da1128f4d21fe1fd629929f8dfd1

    • SSDEEP

      12288:6ffRLpsONV6+uOaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaf:6f5fNV6+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks