General

  • Target

    d6d1db29d6685c7254f3d24fcb5d918b_JaffaCakes118

  • Size

    10.5MB

  • Sample

    241208-nl6phsskhs

  • MD5

    d6d1db29d6685c7254f3d24fcb5d918b

  • SHA1

    3d0b536bbebf8b982570a7f020419b52eec8abc3

  • SHA256

    5c6262f8a6ce018b6eb32110edc0d2bdc96dfd2be9abbda9d03f10debd44d89c

  • SHA512

    6cf3fa8c045b1bf76b6a47f3901898c30390665e7e052d78bf3df4fb8477a1326bd10ba1578cf4d77a56284caf9d593b6bacb298a50c4cf822b5ca09e86e7cf2

  • SSDEEP

    98304:LYTPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:L

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      d6d1db29d6685c7254f3d24fcb5d918b_JaffaCakes118

    • Size

      10.5MB

    • MD5

      d6d1db29d6685c7254f3d24fcb5d918b

    • SHA1

      3d0b536bbebf8b982570a7f020419b52eec8abc3

    • SHA256

      5c6262f8a6ce018b6eb32110edc0d2bdc96dfd2be9abbda9d03f10debd44d89c

    • SHA512

      6cf3fa8c045b1bf76b6a47f3901898c30390665e7e052d78bf3df4fb8477a1326bd10ba1578cf4d77a56284caf9d593b6bacb298a50c4cf822b5ca09e86e7cf2

    • SSDEEP

      98304:LYTPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks