General

  • Target

    fb092c7934eacc2f736c2845b5bca1b7_JaffaCakes118

  • Size

    14.1MB

  • Sample

    240419-ygfmmsee3v

  • MD5

    fb092c7934eacc2f736c2845b5bca1b7

  • SHA1

    cb689ab4ac8afbd421ac33a7f3bc13a055c12737

  • SHA256

    2c6cabba751c4b40a909ec025bf92efee2b6a3ad520bfcfda7042d298781846e

  • SHA512

    e73277f8529f9f0e361a5ee37df2f4ce6bd717c490effdd1e1b2aa06532d11208c4d41bca1b881f559bbc7eab3b43af813aefdd2347d01cdbba48fd81d57718b

  • SSDEEP

    24576:alxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBz:alzOR

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      fb092c7934eacc2f736c2845b5bca1b7_JaffaCakes118

    • Size

      14.1MB

    • MD5

      fb092c7934eacc2f736c2845b5bca1b7

    • SHA1

      cb689ab4ac8afbd421ac33a7f3bc13a055c12737

    • SHA256

      2c6cabba751c4b40a909ec025bf92efee2b6a3ad520bfcfda7042d298781846e

    • SHA512

      e73277f8529f9f0e361a5ee37df2f4ce6bd717c490effdd1e1b2aa06532d11208c4d41bca1b881f559bbc7eab3b43af813aefdd2347d01cdbba48fd81d57718b

    • SSDEEP

      24576:alxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBz:alzOR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks