General

  • Target

    cd5c610b70c17b78c91f0cc625b09f31_JaffaCakes118

  • Size

    12.7MB

  • Sample

    241206-q96erswpgr

  • MD5

    cd5c610b70c17b78c91f0cc625b09f31

  • SHA1

    681324c2ab69d935cf2e6daca83811a4fbc92793

  • SHA256

    0f5925ce372f42751218138d657177d1af0c08547b62a361a235ca16b82ba586

  • SHA512

    dd29fc33436150c30d5c9b1467e300ac3fec1cfcf19874d38b2c873704646232a6b3a354f8eb3c9276930bcca34da385d67b545bf852c65825548b5c770bc18d

  • SSDEEP

    98304:999999999999999999999999999999999999999999999999999999999999999d:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      cd5c610b70c17b78c91f0cc625b09f31_JaffaCakes118

    • Size

      12.7MB

    • MD5

      cd5c610b70c17b78c91f0cc625b09f31

    • SHA1

      681324c2ab69d935cf2e6daca83811a4fbc92793

    • SHA256

      0f5925ce372f42751218138d657177d1af0c08547b62a361a235ca16b82ba586

    • SHA512

      dd29fc33436150c30d5c9b1467e300ac3fec1cfcf19874d38b2c873704646232a6b3a354f8eb3c9276930bcca34da385d67b545bf852c65825548b5c770bc18d

    • SSDEEP

      98304:999999999999999999999999999999999999999999999999999999999999999d:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks