General

  • Target

    e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118

  • Size

    98KB

  • Sample

    240918-qvh1xstckh

  • MD5

    e93b8f5dc41f87a69fcf19115e985860

  • SHA1

    51c55e7ee1d68c26918c1d6e5082dd60f08cde6d

  • SHA256

    ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2

  • SHA512

    787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081

  • SSDEEP

    1536:DOoZ86iHPT3qqj7XHLLvXArePDNlv9AEQKzcVsN9+GUROW3zC1hDaMrAJg7Ub+SJ:DdjsnvXtNlebocVsnUROMzC1NAJQO

Malware Config

Extracted

Family

tofsee

C2

64.20.54.234

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      e93b8f5dc41f87a69fcf19115e985860_JaffaCakes118

    • Size

      98KB

    • MD5

      e93b8f5dc41f87a69fcf19115e985860

    • SHA1

      51c55e7ee1d68c26918c1d6e5082dd60f08cde6d

    • SHA256

      ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2

    • SHA512

      787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081

    • SSDEEP

      1536:DOoZ86iHPT3qqj7XHLLvXArePDNlv9AEQKzcVsN9+GUROW3zC1hDaMrAJg7Ub+SJ:DdjsnvXtNlebocVsnUROMzC1NAJQO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks