General

  • Target

    f1a4db415a4dd63a80f0b8cc7a2d2362_JaffaCakes118

  • Size

    11.1MB

  • Sample

    240415-whg6raeg71

  • MD5

    f1a4db415a4dd63a80f0b8cc7a2d2362

  • SHA1

    d1287fa03a80d1626605431cd341e9d5049afba5

  • SHA256

    87140618703529cf84c6e119ecde2b6faeabba17cd73a817ee17856b2692bb70

  • SHA512

    15a8b53f82a86fabc1a84f52b4b2fe5e59bac869d18996465b355932f7c286250790e54dada414afef270b9c31d5bd9cbfe2fc3aa0e20badc35b3f7f658dfdf5

  • SSDEEP

    12288:WiuYCjGjdPej7mB+DCXRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFJ:RCjGDoD

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f1a4db415a4dd63a80f0b8cc7a2d2362_JaffaCakes118

    • Size

      11.1MB

    • MD5

      f1a4db415a4dd63a80f0b8cc7a2d2362

    • SHA1

      d1287fa03a80d1626605431cd341e9d5049afba5

    • SHA256

      87140618703529cf84c6e119ecde2b6faeabba17cd73a817ee17856b2692bb70

    • SHA512

      15a8b53f82a86fabc1a84f52b4b2fe5e59bac869d18996465b355932f7c286250790e54dada414afef270b9c31d5bd9cbfe2fc3aa0e20badc35b3f7f658dfdf5

    • SSDEEP

      12288:WiuYCjGjdPej7mB+DCXRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFRFJ:RCjGDoD

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks