General

  • Target

    40a22b8b25173fab796f01c5f6279cb8_JaffaCakes118

  • Size

    14.2MB

  • Sample

    241013-sw9ldatdkc

  • MD5

    40a22b8b25173fab796f01c5f6279cb8

  • SHA1

    2e23ee8c8f97fa749637694b0d00025800157f68

  • SHA256

    b6cf6e78306d7eb742e4f758aad5eea3248fdd6c6243ee069e90e9c4c64c373e

  • SHA512

    b580fee075112912c366c6f8fee223a7afb5d5e78c86989344285df35b5ebc48a072ec3a55ee5713d705dc553e907f14c7b5722e55209c23611077161c883c50

  • SSDEEP

    6144:ArxbJOIoKZyaaUo9t+m7c74mOGjZP6NEpTvBzRxkac1B:MF/ZyaaUk+m7c7ZRiNEpTGa

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      40a22b8b25173fab796f01c5f6279cb8_JaffaCakes118

    • Size

      14.2MB

    • MD5

      40a22b8b25173fab796f01c5f6279cb8

    • SHA1

      2e23ee8c8f97fa749637694b0d00025800157f68

    • SHA256

      b6cf6e78306d7eb742e4f758aad5eea3248fdd6c6243ee069e90e9c4c64c373e

    • SHA512

      b580fee075112912c366c6f8fee223a7afb5d5e78c86989344285df35b5ebc48a072ec3a55ee5713d705dc553e907f14c7b5722e55209c23611077161c883c50

    • SSDEEP

      6144:ArxbJOIoKZyaaUo9t+m7c74mOGjZP6NEpTvBzRxkac1B:MF/ZyaaUk+m7c7ZRiNEpTGa

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks