General

  • Target

    a986ebd7bd52f4596e4b317b65e9bb53_JaffaCakes118

  • Size

    13.5MB

  • Sample

    240819-eqmyjatbrf

  • MD5

    a986ebd7bd52f4596e4b317b65e9bb53

  • SHA1

    7e99414758f009fe8bb2c7683914f3591f3deff5

  • SHA256

    31deb36fb3dedd632e9472f2b85c101889dba1133ad199a61cab3f8d89204bf1

  • SHA512

    aa4c1181640300e377950a69898f9ded652d61295063cb75ec6b0ec10c5f65402d9a6510bd5862d94bd015752faccbf1534f6c11cbf7f49498b108cdb4e8eb5f

  • SSDEEP

    12288:YaCPuKabbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb7:guK

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      a986ebd7bd52f4596e4b317b65e9bb53_JaffaCakes118

    • Size

      13.5MB

    • MD5

      a986ebd7bd52f4596e4b317b65e9bb53

    • SHA1

      7e99414758f009fe8bb2c7683914f3591f3deff5

    • SHA256

      31deb36fb3dedd632e9472f2b85c101889dba1133ad199a61cab3f8d89204bf1

    • SHA512

      aa4c1181640300e377950a69898f9ded652d61295063cb75ec6b0ec10c5f65402d9a6510bd5862d94bd015752faccbf1534f6c11cbf7f49498b108cdb4e8eb5f

    • SSDEEP

      12288:YaCPuKabbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb7:guK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks