General

  • Target

    f9e4d29cbf1383086b1eeac1cee11bcc_JaffaCakes118

  • Size

    10.8MB

  • Sample

    240419-j7x72sde9y

  • MD5

    f9e4d29cbf1383086b1eeac1cee11bcc

  • SHA1

    76011bf992a5c81d5b24842358f72144b2d221c4

  • SHA256

    de8a8858b5540698142f413e8990070ce478c2d314f4e61c32496e9eff9a31bf

  • SHA512

    30b3ecbfa24d685f6e99babc58f4af7ed3b966c3e5659843a5fc52a1c60a46645247c38a67674ad5bac2c37797f5de2f5aacb20d75c9726cdf1d3b57b5865348

  • SSDEEP

    12288:BVkuScTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTE:BVX

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f9e4d29cbf1383086b1eeac1cee11bcc_JaffaCakes118

    • Size

      10.8MB

    • MD5

      f9e4d29cbf1383086b1eeac1cee11bcc

    • SHA1

      76011bf992a5c81d5b24842358f72144b2d221c4

    • SHA256

      de8a8858b5540698142f413e8990070ce478c2d314f4e61c32496e9eff9a31bf

    • SHA512

      30b3ecbfa24d685f6e99babc58f4af7ed3b966c3e5659843a5fc52a1c60a46645247c38a67674ad5bac2c37797f5de2f5aacb20d75c9726cdf1d3b57b5865348

    • SSDEEP

      12288:BVkuScTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTcTE:BVX

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks