General

  • Target

    697e454ef3dd9e8d48fb61cecd2cf76b_JaffaCakes118

  • Size

    13.4MB

  • Sample

    240724-abmxrszbrd

  • MD5

    697e454ef3dd9e8d48fb61cecd2cf76b

  • SHA1

    1b0e44aa941afff708b3704d618cc3e69dc1ed83

  • SHA256

    f3b00c122ad21183addcef9d57004601806e04ddeb3a3b3165573380c52f6697

  • SHA512

    6488dd2c8270940ead98a083577390a5368a5402a759b1c23cb4bb9268e978d7456f44f834840dd63cb96515b488d782643619148e47bce682399fe390ea05ca

  • SSDEEP

    196608:cXPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPv:c

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      697e454ef3dd9e8d48fb61cecd2cf76b_JaffaCakes118

    • Size

      13.4MB

    • MD5

      697e454ef3dd9e8d48fb61cecd2cf76b

    • SHA1

      1b0e44aa941afff708b3704d618cc3e69dc1ed83

    • SHA256

      f3b00c122ad21183addcef9d57004601806e04ddeb3a3b3165573380c52f6697

    • SHA512

      6488dd2c8270940ead98a083577390a5368a5402a759b1c23cb4bb9268e978d7456f44f834840dd63cb96515b488d782643619148e47bce682399fe390ea05ca

    • SSDEEP

      196608:cXPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPv:c

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks