General

  • Target

    02e5c341d567695ae3743ddda4916025_JaffaCakes118

  • Size

    12.0MB

  • Sample

    240930-xz48aavepd

  • MD5

    02e5c341d567695ae3743ddda4916025

  • SHA1

    49acfe7ceba9e5407cf355f7fde0a657b680cdf6

  • SHA256

    7e7ca783c5533c85910c1ec4341d64ea045889c959ac9d516d58816ef8f42da6

  • SHA512

    5d8f9508f57dbf2981a1626908ca0fb21a2ffc37f5f8fe9ee514d472238081c9a58e2ee2111b3682498da1aafec5b6269c7311512c6d5d03266375dde414ae6a

  • SSDEEP

    6144:IuZQ8YhtrDfG08esd3CE9ccB3+molfLyKJ:1Z6DfG080E93u59LzJ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      02e5c341d567695ae3743ddda4916025_JaffaCakes118

    • Size

      12.0MB

    • MD5

      02e5c341d567695ae3743ddda4916025

    • SHA1

      49acfe7ceba9e5407cf355f7fde0a657b680cdf6

    • SHA256

      7e7ca783c5533c85910c1ec4341d64ea045889c959ac9d516d58816ef8f42da6

    • SHA512

      5d8f9508f57dbf2981a1626908ca0fb21a2ffc37f5f8fe9ee514d472238081c9a58e2ee2111b3682498da1aafec5b6269c7311512c6d5d03266375dde414ae6a

    • SSDEEP

      6144:IuZQ8YhtrDfG08esd3CE9ccB3+molfLyKJ:1Z6DfG080E93u59LzJ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks