General

  • Target

    a7c01b6159e5aa569cc67d4ad0a361cd_JaffaCakes118

  • Size

    11.1MB

  • Sample

    240818-w5rzgaxelg

  • MD5

    a7c01b6159e5aa569cc67d4ad0a361cd

  • SHA1

    38621e164a7a14acc830852ea0fc8a20d2b51d17

  • SHA256

    01ae748b435caebaa1cb01facf9bd72ee0218442abd27ba4f568b1c733b7ff8c

  • SHA512

    542d8eaa20236659432a9b9168a905ed6551bda86e0cd1ef19d7b6e5498437c1bfb1b74d73946f4599373a662d2f3e9c5829b93f986f4acd2e202bfa559a24fc

  • SSDEEP

    196608:vYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYo:vYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYo

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      a7c01b6159e5aa569cc67d4ad0a361cd_JaffaCakes118

    • Size

      11.1MB

    • MD5

      a7c01b6159e5aa569cc67d4ad0a361cd

    • SHA1

      38621e164a7a14acc830852ea0fc8a20d2b51d17

    • SHA256

      01ae748b435caebaa1cb01facf9bd72ee0218442abd27ba4f568b1c733b7ff8c

    • SHA512

      542d8eaa20236659432a9b9168a905ed6551bda86e0cd1ef19d7b6e5498437c1bfb1b74d73946f4599373a662d2f3e9c5829b93f986f4acd2e202bfa559a24fc

    • SSDEEP

      196608:vYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYo:vYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks