General

  • Target

    26a0c9edc9530dc8e242bd71ab9bf8b1_JaffaCakes118

  • Size

    11.3MB

  • Sample

    240704-3frezavhpn

  • MD5

    26a0c9edc9530dc8e242bd71ab9bf8b1

  • SHA1

    b2dc693d33b373063527009cf982492be2bcf57b

  • SHA256

    df6f272115c6c1b035f42a40c35fd03c674091590178d953570ae3aec4505828

  • SHA512

    3fae0b459f274527ea6744adfb3fab63b23d5468b7532228bb8a335812e24a581e9c4d50b8bcc612e2262d043f2268f4c59c0fff52da57e6473b12c2775156c3

  • SSDEEP

    196608:etPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:e

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      26a0c9edc9530dc8e242bd71ab9bf8b1_JaffaCakes118

    • Size

      11.3MB

    • MD5

      26a0c9edc9530dc8e242bd71ab9bf8b1

    • SHA1

      b2dc693d33b373063527009cf982492be2bcf57b

    • SHA256

      df6f272115c6c1b035f42a40c35fd03c674091590178d953570ae3aec4505828

    • SHA512

      3fae0b459f274527ea6744adfb3fab63b23d5468b7532228bb8a335812e24a581e9c4d50b8bcc612e2262d043f2268f4c59c0fff52da57e6473b12c2775156c3

    • SSDEEP

      196608:etPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks