General

  • Target

    fe3ad8a487aac9594c5a470dd46ac8e2_JaffaCakes118

  • Size

    12.1MB

  • Sample

    240421-c2sbaahb21

  • MD5

    fe3ad8a487aac9594c5a470dd46ac8e2

  • SHA1

    9c6de17f83b0b4c5e1dda4684a0d912b1dd6271c

  • SHA256

    170929e3e7a128082f166a71988e8d97b11f5079fd7c18a780bfda25af14b0e3

  • SHA512

    e000963da5ef22b9fbf1aa48326fb2d79cd95ae57f8f748a2b3ae6278e72308bbbdbd501a4acc62552e78307c7cb10177339bd703eafca59810dfdeb2001aa9b

  • SSDEEP

    24576:OlxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB3:OlzOR

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      fe3ad8a487aac9594c5a470dd46ac8e2_JaffaCakes118

    • Size

      12.1MB

    • MD5

      fe3ad8a487aac9594c5a470dd46ac8e2

    • SHA1

      9c6de17f83b0b4c5e1dda4684a0d912b1dd6271c

    • SHA256

      170929e3e7a128082f166a71988e8d97b11f5079fd7c18a780bfda25af14b0e3

    • SHA512

      e000963da5ef22b9fbf1aa48326fb2d79cd95ae57f8f748a2b3ae6278e72308bbbdbd501a4acc62552e78307c7cb10177339bd703eafca59810dfdeb2001aa9b

    • SSDEEP

      24576:OlxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB3:OlzOR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks