General

  • Target

    9428f772e9b45f9b913a994fdb3764c3_JaffaCakes118

  • Size

    281KB

  • Sample

    240813-wm8jhashmm

  • MD5

    9428f772e9b45f9b913a994fdb3764c3

  • SHA1

    ad70e068e3bf69d6a831feb6822c83be812cefdd

  • SHA256

    0548c1554dc0fb03a1396903eca1ed380b42004014077d4fc84075bc2d8e8022

  • SHA512

    59939d2b0b81ff8b67ae5f9981d53422917eabef6a578123b10955e3c44312a957c2de87c5f309ebfb683119cb894f8fb7b01bb6a29bf1c577a6f1215e7d406d

  • SSDEEP

    6144:aBtL1LUuMssvzG+WyLwB/rBL0SFROhxxpeTr/ekI:YL1ouQvzGHuVzxp6L

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      9428f772e9b45f9b913a994fdb3764c3_JaffaCakes118

    • Size

      281KB

    • MD5

      9428f772e9b45f9b913a994fdb3764c3

    • SHA1

      ad70e068e3bf69d6a831feb6822c83be812cefdd

    • SHA256

      0548c1554dc0fb03a1396903eca1ed380b42004014077d4fc84075bc2d8e8022

    • SHA512

      59939d2b0b81ff8b67ae5f9981d53422917eabef6a578123b10955e3c44312a957c2de87c5f309ebfb683119cb894f8fb7b01bb6a29bf1c577a6f1215e7d406d

    • SSDEEP

      6144:aBtL1LUuMssvzG+WyLwB/rBL0SFROhxxpeTr/ekI:YL1ouQvzGHuVzxp6L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks