General

  • Target

    c7b736a9fca49450b679452260c86084_JaffaCakes118

  • Size

    12.9MB

  • Sample

    240828-1s6djsyane

  • MD5

    c7b736a9fca49450b679452260c86084

  • SHA1

    65831ef95101644640229fd4872a69b738db4b19

  • SHA256

    ecb8395da2818b288bae02ac7827548df335aeefed102d6a9bda6d3738108c56

  • SHA512

    e987647067046fb2d4a3501c1ef4ddcc0d3533f1def8f38b52168cb4d431961cb131abd69a992fca0cb6998daf5ace33a7e279c93173617a79119f090d063e9a

  • SSDEEP

    196608:vJ2MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMH:v

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      c7b736a9fca49450b679452260c86084_JaffaCakes118

    • Size

      12.9MB

    • MD5

      c7b736a9fca49450b679452260c86084

    • SHA1

      65831ef95101644640229fd4872a69b738db4b19

    • SHA256

      ecb8395da2818b288bae02ac7827548df335aeefed102d6a9bda6d3738108c56

    • SHA512

      e987647067046fb2d4a3501c1ef4ddcc0d3533f1def8f38b52168cb4d431961cb131abd69a992fca0cb6998daf5ace33a7e279c93173617a79119f090d063e9a

    • SSDEEP

      196608:vJ2MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMH:v

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks