General

  • Target

    f32bc79d3ad21de604fa37038da7e745_JaffaCakes118

  • Size

    14.5MB

  • Sample

    240416-k9564sga5w

  • MD5

    f32bc79d3ad21de604fa37038da7e745

  • SHA1

    51ce5b09338e62e7bd869cd2939c50ec011f1782

  • SHA256

    3f487cd4fe611496acdd0cb193385e2bb233d535e99b5f6caadcf172150f38a5

  • SHA512

    692cb21d4f9078953449114c7a3743fa201fdb391c89577a59c72d3e2bbc4f77174723a8f36f395cb508df82fbd24b989e11caa9c496f4ad85c9fc4931b45cdc

  • SSDEEP

    196608:sb/////////////////////////////////////////////////////////////H:s

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f32bc79d3ad21de604fa37038da7e745_JaffaCakes118

    • Size

      14.5MB

    • MD5

      f32bc79d3ad21de604fa37038da7e745

    • SHA1

      51ce5b09338e62e7bd869cd2939c50ec011f1782

    • SHA256

      3f487cd4fe611496acdd0cb193385e2bb233d535e99b5f6caadcf172150f38a5

    • SHA512

      692cb21d4f9078953449114c7a3743fa201fdb391c89577a59c72d3e2bbc4f77174723a8f36f395cb508df82fbd24b989e11caa9c496f4ad85c9fc4931b45cdc

    • SSDEEP

      196608:sb/////////////////////////////////////////////////////////////H:s

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks