General

  • Target

    2ee3d2fccb4958d4db46211115b69b4f_JaffaCakes118

  • Size

    11.0MB

  • Sample

    241009-lpxjxawank

  • MD5

    2ee3d2fccb4958d4db46211115b69b4f

  • SHA1

    405236a23bcd689505d0dd9954b0338e6b4e31ca

  • SHA256

    78b66266e386520e9237277177df4ded95ae576e3037be7283280c45e265bc4c

  • SHA512

    6f03e55b0e6a6bf74977f12e2dd1f00b4968d5eb4b4a2b6a62ace3cf7100262c83679d3bfe4d71ae2692ac0298565b389c98ca8b07523a62c1b66866f75b216f

  • SSDEEP

    196608:Xdrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr:Nrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrn

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      2ee3d2fccb4958d4db46211115b69b4f_JaffaCakes118

    • Size

      11.0MB

    • MD5

      2ee3d2fccb4958d4db46211115b69b4f

    • SHA1

      405236a23bcd689505d0dd9954b0338e6b4e31ca

    • SHA256

      78b66266e386520e9237277177df4ded95ae576e3037be7283280c45e265bc4c

    • SHA512

      6f03e55b0e6a6bf74977f12e2dd1f00b4968d5eb4b4a2b6a62ace3cf7100262c83679d3bfe4d71ae2692ac0298565b389c98ca8b07523a62c1b66866f75b216f

    • SSDEEP

      196608:Xdrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr:Nrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrn

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks