General

  • Target

    0151396c13b5bc6865551434163d108c_JaffaCakes118

  • Size

    11.7MB

  • Sample

    240622-fcycsaydpd

  • MD5

    0151396c13b5bc6865551434163d108c

  • SHA1

    662f732341113522d951ccb10e0bbe8af7719d21

  • SHA256

    0b827bbdc981c850683d5ec4fd095438f962ed6151e05537855008ff79d045c2

  • SHA512

    c94bc7bc0faa5a6ccddc0dfec21c188de3c0625a8d85162a3531e7f07de11effde1b730c8e11b60a6df9aea2a325194bffc703c5860e6e9b3f55406f17d942ff

  • SSDEEP

    12288:gZDHr9j8gEh4CFNUBCWwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA:gVHrGc

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      0151396c13b5bc6865551434163d108c_JaffaCakes118

    • Size

      11.7MB

    • MD5

      0151396c13b5bc6865551434163d108c

    • SHA1

      662f732341113522d951ccb10e0bbe8af7719d21

    • SHA256

      0b827bbdc981c850683d5ec4fd095438f962ed6151e05537855008ff79d045c2

    • SHA512

      c94bc7bc0faa5a6ccddc0dfec21c188de3c0625a8d85162a3531e7f07de11effde1b730c8e11b60a6df9aea2a325194bffc703c5860e6e9b3f55406f17d942ff

    • SSDEEP

      12288:gZDHr9j8gEh4CFNUBCWwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA:gVHrGc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks