General

  • Target

    ee32ada5e5b8578f25d6f2b0762d2f28_JaffaCakes118

  • Size

    12.6MB

  • Sample

    240920-w9r52a1gmp

  • MD5

    ee32ada5e5b8578f25d6f2b0762d2f28

  • SHA1

    d7cf1680da472199f301dcc5758c95b0c11820fc

  • SHA256

    eb63b5df3fa1a0f2c6241e26e3269cf5319180d392819110d765ce5d735d1557

  • SHA512

    e96ff40d526a55b0df2499dbc2df4f38f0ef5fd36440c95f939646c290410f9c95f783733e8e44d17ffc09cf52af3ed622ed87123cc7d3bee4797fe4583e613d

  • SSDEEP

    393216:N88888888888888888888888888888888888888888888888888888888888888M:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      ee32ada5e5b8578f25d6f2b0762d2f28_JaffaCakes118

    • Size

      12.6MB

    • MD5

      ee32ada5e5b8578f25d6f2b0762d2f28

    • SHA1

      d7cf1680da472199f301dcc5758c95b0c11820fc

    • SHA256

      eb63b5df3fa1a0f2c6241e26e3269cf5319180d392819110d765ce5d735d1557

    • SHA512

      e96ff40d526a55b0df2499dbc2df4f38f0ef5fd36440c95f939646c290410f9c95f783733e8e44d17ffc09cf52af3ed622ed87123cc7d3bee4797fe4583e613d

    • SSDEEP

      393216:N88888888888888888888888888888888888888888888888888888888888888M:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks