General

  • Target

    f4c9ca0aae067a11649370278de2a937_JaffaCakes118

  • Size

    11.5MB

  • Sample

    240417-cbr8laae95

  • MD5

    f4c9ca0aae067a11649370278de2a937

  • SHA1

    e1fc4e42abfe1accb7e200d21f1f0d329838e81e

  • SHA256

    b3ef346a16f90c3811847840e66397ca8c9938707e37cfd274ee6bb9004c741d

  • SHA512

    8062c679c66c895dd3173ccfa56eacf6b5dbeaa6c5d60712ba3c59f05cddd053ff79209486fc0c9063973ba06e9aa32532d58cd74cf56a5e255b2550d95ae487

  • SSDEEP

    24576:OjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeO:O/D

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f4c9ca0aae067a11649370278de2a937_JaffaCakes118

    • Size

      11.5MB

    • MD5

      f4c9ca0aae067a11649370278de2a937

    • SHA1

      e1fc4e42abfe1accb7e200d21f1f0d329838e81e

    • SHA256

      b3ef346a16f90c3811847840e66397ca8c9938707e37cfd274ee6bb9004c741d

    • SHA512

      8062c679c66c895dd3173ccfa56eacf6b5dbeaa6c5d60712ba3c59f05cddd053ff79209486fc0c9063973ba06e9aa32532d58cd74cf56a5e255b2550d95ae487

    • SSDEEP

      24576:OjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeO:O/D

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks