General

  • Target

    e3b05fdf50cf2ba019181a935c1fdde5_JaffaCakes118

  • Size

    12.6MB

  • Sample

    240916-a365qa1cpm

  • MD5

    e3b05fdf50cf2ba019181a935c1fdde5

  • SHA1

    8b5aaf25c9f5001089b7b60380e3173c5d98f8dc

  • SHA256

    16ad57aecbfa943ed105d550c94a348aa013c8dea6b3e9281b317d464d74d9f6

  • SHA512

    e5e3586be6916888237dfac294ab57c753212f270efd4f9c4c8206912fc953bcdcb21a2400797266e1e0ada4ae69bde0a1cdd274f9a52407edd077d123909e8b

  • SSDEEP

    24576:iBYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYP:i

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      e3b05fdf50cf2ba019181a935c1fdde5_JaffaCakes118

    • Size

      12.6MB

    • MD5

      e3b05fdf50cf2ba019181a935c1fdde5

    • SHA1

      8b5aaf25c9f5001089b7b60380e3173c5d98f8dc

    • SHA256

      16ad57aecbfa943ed105d550c94a348aa013c8dea6b3e9281b317d464d74d9f6

    • SHA512

      e5e3586be6916888237dfac294ab57c753212f270efd4f9c4c8206912fc953bcdcb21a2400797266e1e0ada4ae69bde0a1cdd274f9a52407edd077d123909e8b

    • SSDEEP

      24576:iBYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYP:i

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks