General

  • Target

    184d8deaa51d84c10e00a9dc7b28a40d_JaffaCakes118

  • Size

    10.9MB

  • Sample

    241006-qwrz8a1cmf

  • MD5

    184d8deaa51d84c10e00a9dc7b28a40d

  • SHA1

    8646698b578a72a3c4bbc601bd7af3341f2f89c1

  • SHA256

    5ca5ccd924b945c085e70b8af94809345d979169dd31b198e60705374987eeaf

  • SHA512

    37881a88a0aff5f3737a9f3cdf7594279a1cabb51db5b338b3c9fa61ad5b953ba2708ac0200c2f1cb3ab8c62760c59b6646637ccf9cff3d63babc84d1dca8517

  • SSDEEP

    24576:lPTYeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeu:lP

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      184d8deaa51d84c10e00a9dc7b28a40d_JaffaCakes118

    • Size

      10.9MB

    • MD5

      184d8deaa51d84c10e00a9dc7b28a40d

    • SHA1

      8646698b578a72a3c4bbc601bd7af3341f2f89c1

    • SHA256

      5ca5ccd924b945c085e70b8af94809345d979169dd31b198e60705374987eeaf

    • SHA512

      37881a88a0aff5f3737a9f3cdf7594279a1cabb51db5b338b3c9fa61ad5b953ba2708ac0200c2f1cb3ab8c62760c59b6646637ccf9cff3d63babc84d1dca8517

    • SSDEEP

      24576:lPTYeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeu:lP

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks