General

  • Target

    f5a99263467440a04da884e37b581577_JaffaCakes118

  • Size

    14.2MB

  • Sample

    240417-nkcp2sdc46

  • MD5

    f5a99263467440a04da884e37b581577

  • SHA1

    58c016d9dae50898c03dc602997db96b14fbc2fe

  • SHA256

    bc51cad0a8ed5eb57551f034a5f693b4d1c135201a38ff4b3d7c1eb6151745c2

  • SHA512

    b5255af60ca12756011398e5907ef6587cd9ea77401b55b30c0812c2c616ab492eff9d2bba6c5a7ba7732e2f4f0eba80d702bb0d98e767499d182219e16f45af

  • SSDEEP

    196608:H4TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTH:H

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f5a99263467440a04da884e37b581577_JaffaCakes118

    • Size

      14.2MB

    • MD5

      f5a99263467440a04da884e37b581577

    • SHA1

      58c016d9dae50898c03dc602997db96b14fbc2fe

    • SHA256

      bc51cad0a8ed5eb57551f034a5f693b4d1c135201a38ff4b3d7c1eb6151745c2

    • SHA512

      b5255af60ca12756011398e5907ef6587cd9ea77401b55b30c0812c2c616ab492eff9d2bba6c5a7ba7732e2f4f0eba80d702bb0d98e767499d182219e16f45af

    • SSDEEP

      196608:H4TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTH:H

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks