General

  • Target

    29ca45114babce59d37bf2c45836a794_JaffaCakes118

  • Size

    106KB

  • Sample

    240707-g6t3wswbnj

  • MD5

    29ca45114babce59d37bf2c45836a794

  • SHA1

    973b1efebfd167d304fef2f59c8ec4ffe22a7c78

  • SHA256

    3fe12c4360a1c325426c748c3dc88bd4ada95b53883e8a71ed8cfe49a9548734

  • SHA512

    4c29556977c79ace3c0c12f9672cf446a01fbfcc3b1cb1a1b6e65a11ceb0ad6673e85ba8fb96ac913891171f0edfba04cfa157570c8f7b7edc784c3c75fd967c

  • SSDEEP

    1536:IwGVxjjSw7LhpTkVCmJw5RH7Q3PW7UW3+EzhEpGEtJotRugCm7ZnyJSB:deVpmCmJw5qWwW3XleGQqt8Bm7ZW8

Malware Config

Extracted

Family

tofsee

C2

94.75.255.140

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      29ca45114babce59d37bf2c45836a794_JaffaCakes118

    • Size

      106KB

    • MD5

      29ca45114babce59d37bf2c45836a794

    • SHA1

      973b1efebfd167d304fef2f59c8ec4ffe22a7c78

    • SHA256

      3fe12c4360a1c325426c748c3dc88bd4ada95b53883e8a71ed8cfe49a9548734

    • SHA512

      4c29556977c79ace3c0c12f9672cf446a01fbfcc3b1cb1a1b6e65a11ceb0ad6673e85ba8fb96ac913891171f0edfba04cfa157570c8f7b7edc784c3c75fd967c

    • SSDEEP

      1536:IwGVxjjSw7LhpTkVCmJw5RH7Q3PW7UW3+EzhEpGEtJotRugCm7ZnyJSB:deVpmCmJw5qWwW3XleGQqt8Bm7ZW8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks