General

  • Target

    JaffaCakes118_e41b36781115c6d30f9a721299d9279d

  • Size

    12.6MB

  • Sample

    250110-pjkjyawndj

  • MD5

    e41b36781115c6d30f9a721299d9279d

  • SHA1

    39644feb784bd5f90667c6d181acfbe6e5d2ef1d

  • SHA256

    372010d5c8c0252c2665102e9ae4afdde5b549ed877bc8c8c5989fdce0b57a0e

  • SHA512

    a5bc6a465114d043ef90173ad5d911ea910648ad7a317fa1a105dbf48d00d73228f8c33dbb09800c7294769e3db6030c992d28c19246c32de28efcacc87096b8

  • SSDEEP

    393216:fH2222222222222222222222222222222222222222222222222222222222222u:v222222222222222222222222222222P

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      JaffaCakes118_e41b36781115c6d30f9a721299d9279d

    • Size

      12.6MB

    • MD5

      e41b36781115c6d30f9a721299d9279d

    • SHA1

      39644feb784bd5f90667c6d181acfbe6e5d2ef1d

    • SHA256

      372010d5c8c0252c2665102e9ae4afdde5b549ed877bc8c8c5989fdce0b57a0e

    • SHA512

      a5bc6a465114d043ef90173ad5d911ea910648ad7a317fa1a105dbf48d00d73228f8c33dbb09800c7294769e3db6030c992d28c19246c32de28efcacc87096b8

    • SSDEEP

      393216:fH2222222222222222222222222222222222222222222222222222222222222u:v222222222222222222222222222222P

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks