General

  • Target

    JaffaCakes118_3566557df83506670d9589b709f71cbd

  • Size

    12.9MB

  • Sample

    241231-zct5xaxrct

  • MD5

    3566557df83506670d9589b709f71cbd

  • SHA1

    e89af9bfe94a96b256f8559bf3b9fbcf32606ccd

  • SHA256

    902c64f8f0ca0373d745468bb8941d492e0aa734f0c081088b4dd0ab153097d7

  • SHA512

    0c8e955713344770a0f464823368931261b59c876d02e838259889f7354730248934b301f4d4ca320d1c18e5aaabd03b4af3cb0b323622058bbef0c395961c71

  • SSDEEP

    393216:QppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppX:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Targets

    • Target

      JaffaCakes118_3566557df83506670d9589b709f71cbd

    • Size

      12.9MB

    • MD5

      3566557df83506670d9589b709f71cbd

    • SHA1

      e89af9bfe94a96b256f8559bf3b9fbcf32606ccd

    • SHA256

      902c64f8f0ca0373d745468bb8941d492e0aa734f0c081088b4dd0ab153097d7

    • SHA512

      0c8e955713344770a0f464823368931261b59c876d02e838259889f7354730248934b301f4d4ca320d1c18e5aaabd03b4af3cb0b323622058bbef0c395961c71

    • SSDEEP

      393216:QppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks