General

  • Target

    d8fee716b4673dbe2860a3cefb3ccf03_JaffaCakes118

  • Size

    11.5MB

  • Sample

    240910-zaacqavfqa

  • MD5

    d8fee716b4673dbe2860a3cefb3ccf03

  • SHA1

    1649c17a2b4c0d816aeba0b6759afa73b7b4a6d9

  • SHA256

    aab32afff9386da5026e13907bc9b3449ca79216b3bdf027a4f54a399dde7576

  • SHA512

    c8d20e8b80ea466e7ebf3a4b8303f27d9566bacd3614f6b36bca683dc5e54d5aca97aa66897bb70f50072f5d97de27c4702d57764d344399f1bee5e3ba6359b9

  • SSDEEP

    3072:/oiqjV0QCeV75zMwb2EfDXTBrt0c5f+Z7ApWt+0krytpObPUfAGM4H1M4CjiJNx4:/oiqjWHeV9zthDjBrmA+VkDbSAgQiTx

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d8fee716b4673dbe2860a3cefb3ccf03_JaffaCakes118

    • Size

      11.5MB

    • MD5

      d8fee716b4673dbe2860a3cefb3ccf03

    • SHA1

      1649c17a2b4c0d816aeba0b6759afa73b7b4a6d9

    • SHA256

      aab32afff9386da5026e13907bc9b3449ca79216b3bdf027a4f54a399dde7576

    • SHA512

      c8d20e8b80ea466e7ebf3a4b8303f27d9566bacd3614f6b36bca683dc5e54d5aca97aa66897bb70f50072f5d97de27c4702d57764d344399f1bee5e3ba6359b9

    • SSDEEP

      3072:/oiqjV0QCeV75zMwb2EfDXTBrt0c5f+Z7ApWt+0krytpObPUfAGM4H1M4CjiJNx4:/oiqjWHeV9zthDjBrmA+VkDbSAgQiTx

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks