General

  • Target

    fb53a3645626f491923c495997330c8d_JaffaCakes118

  • Size

    14.8MB

  • Sample

    240419-2m2c3shd88

  • MD5

    fb53a3645626f491923c495997330c8d

  • SHA1

    da6c44e90b85ea788c4076b7ed67d1b02213ccfe

  • SHA256

    ad93fa58692bf500dc7f4a54513d87f0cceeaf9a955bc3d366abd2e2bbcaeedb

  • SHA512

    311e78a1740839ff21a31f1082d881ce31157c11767b901bef6232b9afd34e7fe18d93badf8f54d65ef4ec1d64dcfdf7ec6cc9f1ee25429fe9c51342b0926a37

  • SSDEEP

    24576:PjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee+:P/D

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      fb53a3645626f491923c495997330c8d_JaffaCakes118

    • Size

      14.8MB

    • MD5

      fb53a3645626f491923c495997330c8d

    • SHA1

      da6c44e90b85ea788c4076b7ed67d1b02213ccfe

    • SHA256

      ad93fa58692bf500dc7f4a54513d87f0cceeaf9a955bc3d366abd2e2bbcaeedb

    • SHA512

      311e78a1740839ff21a31f1082d881ce31157c11767b901bef6232b9afd34e7fe18d93badf8f54d65ef4ec1d64dcfdf7ec6cc9f1ee25429fe9c51342b0926a37

    • SSDEEP

      24576:PjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee+:P/D

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks