General

  • Target

    6a05a5da802f453957669ef5435c969f_JaffaCakes118

  • Size

    13.1MB

  • Sample

    240724-dktcpaxhld

  • MD5

    6a05a5da802f453957669ef5435c969f

  • SHA1

    3eafa3328c9ff522386a0dfba196f1fb1d4f2e5c

  • SHA256

    ff63e0e9c87d9151822cede77df12c3d037dbfd39865437c7e7e23e33a15f5bc

  • SHA512

    9a2f0d83904497b0a54ae59db074969b2225edf406faee0cec562523c74cd9d8fe19acbe40c3e84604a0d8e6436802f4d332962834110d382164bab47fff7b46

  • SSDEEP

    393216:E55555555555555555555555555555555555555555555555555555555555555H:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      6a05a5da802f453957669ef5435c969f_JaffaCakes118

    • Size

      13.1MB

    • MD5

      6a05a5da802f453957669ef5435c969f

    • SHA1

      3eafa3328c9ff522386a0dfba196f1fb1d4f2e5c

    • SHA256

      ff63e0e9c87d9151822cede77df12c3d037dbfd39865437c7e7e23e33a15f5bc

    • SHA512

      9a2f0d83904497b0a54ae59db074969b2225edf406faee0cec562523c74cd9d8fe19acbe40c3e84604a0d8e6436802f4d332962834110d382164bab47fff7b46

    • SSDEEP

      393216:E55555555555555555555555555555555555555555555555555555555555555H:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks