General

  • Target

    45bd4a3c341ab81c70f1fdc136bc77e4_JaffaCakes118

  • Size

    11.4MB

  • Sample

    241015-ellvnstdra

  • MD5

    45bd4a3c341ab81c70f1fdc136bc77e4

  • SHA1

    fe6c5d998a976a2b37204a02aba4933fc5e349e9

  • SHA256

    ca2ce6433e4e6bd1587a16aabf7c4fd49d45e3aa36acf99bda30a07c81966500

  • SHA512

    77f9b9a77f35b8fc686a60fb53acfa642555d085dbbad107481a82e1d4d16044ab485923c0d9d6020dbccd8d67dbd836620d6395632ad5b993b6987e02ecd002

  • SSDEEP

    3072:bHZQIswULGiBqwZyNvXT/u22H/PaAf209fB7epgDnESzN57I6ZibkFah/NleJm/6:bHZQItUDBJiPT/u22H3s0DhcHU4l

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      45bd4a3c341ab81c70f1fdc136bc77e4_JaffaCakes118

    • Size

      11.4MB

    • MD5

      45bd4a3c341ab81c70f1fdc136bc77e4

    • SHA1

      fe6c5d998a976a2b37204a02aba4933fc5e349e9

    • SHA256

      ca2ce6433e4e6bd1587a16aabf7c4fd49d45e3aa36acf99bda30a07c81966500

    • SHA512

      77f9b9a77f35b8fc686a60fb53acfa642555d085dbbad107481a82e1d4d16044ab485923c0d9d6020dbccd8d67dbd836620d6395632ad5b993b6987e02ecd002

    • SSDEEP

      3072:bHZQIswULGiBqwZyNvXT/u22H/PaAf209fB7epgDnESzN57I6ZibkFah/NleJm/6:bHZQItUDBJiPT/u22H3s0DhcHU4l

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks