General

  • Target

    555a84e13bf2fc3192ed64aa2fe51316_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240717-3z6c8syfrc

  • MD5

    555a84e13bf2fc3192ed64aa2fe51316

  • SHA1

    d3edbb5d9ab41f575430e7f6e6bad604bce847d0

  • SHA256

    0f9ab2429ef2e90dc55a1b537175c2e5c4be200de90cec04e5c66c68513b3d5a

  • SHA512

    514ab8a31137bc584a9183d750db08e69befcf9aac2ac74c72444e2650d3eb3618f127c24039a6a40d16c4af94ee1052974736481ecdd0df75d92be3d115b1e3

  • SSDEEP

    6144:pxU32BT0jz22222222222222222222222222222222222222222222222222222/:bUmK

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      555a84e13bf2fc3192ed64aa2fe51316_JaffaCakes118

    • Size

      11.4MB

    • MD5

      555a84e13bf2fc3192ed64aa2fe51316

    • SHA1

      d3edbb5d9ab41f575430e7f6e6bad604bce847d0

    • SHA256

      0f9ab2429ef2e90dc55a1b537175c2e5c4be200de90cec04e5c66c68513b3d5a

    • SHA512

      514ab8a31137bc584a9183d750db08e69befcf9aac2ac74c72444e2650d3eb3618f127c24039a6a40d16c4af94ee1052974736481ecdd0df75d92be3d115b1e3

    • SSDEEP

      6144:pxU32BT0jz22222222222222222222222222222222222222222222222222222/:bUmK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks