General

  • Target

    JaffaCakes118_6673656f0eea34edbe311046d2525113

  • Size

    11.2MB

  • Sample

    250102-twn54sxrbs

  • MD5

    6673656f0eea34edbe311046d2525113

  • SHA1

    d94411ba9cec4a38a2f2ddf11df6f2e27eb5cbfd

  • SHA256

    00a7fe01857f4c5a118c936b5573b4c2755c8369534870394c3d61a5af058bcc

  • SHA512

    f321489b42db6d062837414749adaefffeb87703f937b8ebb1e27a670cae75128af278222284b8bd72d26828535b1683d821e97b721d110b971d183312f37a01

  • SSDEEP

    12288:ozZd0++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/:ozZ

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      JaffaCakes118_6673656f0eea34edbe311046d2525113

    • Size

      11.2MB

    • MD5

      6673656f0eea34edbe311046d2525113

    • SHA1

      d94411ba9cec4a38a2f2ddf11df6f2e27eb5cbfd

    • SHA256

      00a7fe01857f4c5a118c936b5573b4c2755c8369534870394c3d61a5af058bcc

    • SHA512

      f321489b42db6d062837414749adaefffeb87703f937b8ebb1e27a670cae75128af278222284b8bd72d26828535b1683d821e97b721d110b971d183312f37a01

    • SSDEEP

      12288:ozZd0++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/:ozZ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks