General

  • Target

    dd2de935e742c9e508444e1cf0164886_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240912-2nmajszdpc

  • MD5

    dd2de935e742c9e508444e1cf0164886

  • SHA1

    f5c318ac0a60c5c468f31855c5fc34b9a888b790

  • SHA256

    a8f1e1a6df372687c42edc522fc4c6b2f068bd05e8e5f56f92ffc037dd64e2d8

  • SHA512

    c3aae71923e52e48e6e07d8a1eac1a7449cf20661f4836281e04c025c8db6a1046df6f4c2ea58f31b16cd860f6b02cd4367088f01280a38865eb7ac336879440

  • SSDEEP

    393216:odQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ/:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      dd2de935e742c9e508444e1cf0164886_JaffaCakes118

    • Size

      12.3MB

    • MD5

      dd2de935e742c9e508444e1cf0164886

    • SHA1

      f5c318ac0a60c5c468f31855c5fc34b9a888b790

    • SHA256

      a8f1e1a6df372687c42edc522fc4c6b2f068bd05e8e5f56f92ffc037dd64e2d8

    • SHA512

      c3aae71923e52e48e6e07d8a1eac1a7449cf20661f4836281e04c025c8db6a1046df6f4c2ea58f31b16cd860f6b02cd4367088f01280a38865eb7ac336879440

    • SSDEEP

      393216:odQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ/:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks