General

  • Target

    JaffaCakes118_27a880b8a04d59fa74e9ca0c7db57718599f1efca0c593739c12cb1fad9040dc

  • Size

    11.6MB

  • Sample

    241230-acgr5s1mcy

  • MD5

    cecab87eece6151682a5dffe04831bb6

  • SHA1

    e3d6a4c3d0f25f63abf5aa5c906da1b681462714

  • SHA256

    27a880b8a04d59fa74e9ca0c7db57718599f1efca0c593739c12cb1fad9040dc

  • SHA512

    1d39a758f9415b493fee4bc0921bfa627d2939d21386a7cd3b9b8f216d75e5025a5f3ff6414b6bfaf2a8acac817cf42a77005677e99ff10094572318a4933ebd

  • SSDEEP

    3072:8CWKsDRr8015LRYiiU/WCMecR3MTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzj:8Ust8015p/WLD

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      JaffaCakes118_27a880b8a04d59fa74e9ca0c7db57718599f1efca0c593739c12cb1fad9040dc

    • Size

      11.6MB

    • MD5

      cecab87eece6151682a5dffe04831bb6

    • SHA1

      e3d6a4c3d0f25f63abf5aa5c906da1b681462714

    • SHA256

      27a880b8a04d59fa74e9ca0c7db57718599f1efca0c593739c12cb1fad9040dc

    • SHA512

      1d39a758f9415b493fee4bc0921bfa627d2939d21386a7cd3b9b8f216d75e5025a5f3ff6414b6bfaf2a8acac817cf42a77005677e99ff10094572318a4933ebd

    • SSDEEP

      3072:8CWKsDRr8015LRYiiU/WCMecR3MTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzTjzj:8Ust8015p/WLD

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks