General

  • Target

    de1304cd9a3df49bed31e2e30455228a_JaffaCakes118

  • Size

    14.8MB

  • Sample

    240913-klhe5svbrb

  • MD5

    de1304cd9a3df49bed31e2e30455228a

  • SHA1

    a313f8c3ff1fc8af63c97e1fccb1665734937aa8

  • SHA256

    85f52025f20d7c908a33db506d5618087b3c73d13bf461a90401df0e6e561af4

  • SHA512

    dff870d3dd794aea9b1a5258d9e354d7ad8f3c1c5e38e5559af968c7adde4584f0a83fb84c566a25287371c02dce72b27bde7193b7ce3031e01bc91a64f4a78f

  • SSDEEP

    196608:p3qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqX:p

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      de1304cd9a3df49bed31e2e30455228a_JaffaCakes118

    • Size

      14.8MB

    • MD5

      de1304cd9a3df49bed31e2e30455228a

    • SHA1

      a313f8c3ff1fc8af63c97e1fccb1665734937aa8

    • SHA256

      85f52025f20d7c908a33db506d5618087b3c73d13bf461a90401df0e6e561af4

    • SHA512

      dff870d3dd794aea9b1a5258d9e354d7ad8f3c1c5e38e5559af968c7adde4584f0a83fb84c566a25287371c02dce72b27bde7193b7ce3031e01bc91a64f4a78f

    • SSDEEP

      196608:p3qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqX:p

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks