General

  • Target

    f3c8d3257218a2b7afc8a4c8e9c77d3f_JaffaCakes118

  • Size

    12.2MB

  • Sample

    240416-szgprsfc4w

  • MD5

    f3c8d3257218a2b7afc8a4c8e9c77d3f

  • SHA1

    8667190ac0beb9d575f3ae8ca1690498d2ab0dd5

  • SHA256

    1f0454306dcfba27f8b800e1afaf802d1a88b92e2a096cab863fc26ed8fdc7b0

  • SHA512

    019a0d7dd5e4c3ef7c167e4186cadb39e9042dda7592a0550f3993f7336997ac342c76309857bdd1b28bce87ed03ad80cd000d4c53755640c3855c54c48c32bb

  • SSDEEP

    6144:MgZQZcij488Ua7qY57rMzCo8AqtSRV+a1Q:LZij488UaWYMzB5HRV+g

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f3c8d3257218a2b7afc8a4c8e9c77d3f_JaffaCakes118

    • Size

      12.2MB

    • MD5

      f3c8d3257218a2b7afc8a4c8e9c77d3f

    • SHA1

      8667190ac0beb9d575f3ae8ca1690498d2ab0dd5

    • SHA256

      1f0454306dcfba27f8b800e1afaf802d1a88b92e2a096cab863fc26ed8fdc7b0

    • SHA512

      019a0d7dd5e4c3ef7c167e4186cadb39e9042dda7592a0550f3993f7336997ac342c76309857bdd1b28bce87ed03ad80cd000d4c53755640c3855c54c48c32bb

    • SSDEEP

      6144:MgZQZcij488Ua7qY57rMzCo8AqtSRV+a1Q:LZij488UaWYMzB5HRV+g

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks