General

  • Target

    967d280b68ea4ad92da2208267140c2e_JaffaCakes118

  • Size

    14.5MB

  • Sample

    240814-rxh95sscrr

  • MD5

    967d280b68ea4ad92da2208267140c2e

  • SHA1

    2fa00d6845eb26e519bd8a25228ae6250790a44b

  • SHA256

    2a856f610a38a01bf58d2642f75f2a113261e6ad749d58e254705fde7451272b

  • SHA512

    42c4f33f453118415b914a504ba1962703b0833b1e249771cbc35652d2c8a27c3a5ef9488018c721869d8373bb094016199367e48f906c59244e102f0c44df11

  • SSDEEP

    196608:Q5qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqa:Q

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      967d280b68ea4ad92da2208267140c2e_JaffaCakes118

    • Size

      14.5MB

    • MD5

      967d280b68ea4ad92da2208267140c2e

    • SHA1

      2fa00d6845eb26e519bd8a25228ae6250790a44b

    • SHA256

      2a856f610a38a01bf58d2642f75f2a113261e6ad749d58e254705fde7451272b

    • SHA512

      42c4f33f453118415b914a504ba1962703b0833b1e249771cbc35652d2c8a27c3a5ef9488018c721869d8373bb094016199367e48f906c59244e102f0c44df11

    • SSDEEP

      196608:Q5qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqa:Q

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks