General

  • Target

    5d1470caf0cf10f682be43586f909f62_JaffaCakes118

  • Size

    14.7MB

  • Sample

    241019-rspala1bjg

  • MD5

    5d1470caf0cf10f682be43586f909f62

  • SHA1

    8b8e686d21ff3277ce86d9b5f9475eff108875ff

  • SHA256

    39177e8c1255444d714f716028f324d346c3f9ce13e99554ef9a56a9094bdf58

  • SHA512

    c265fee6d74bfaaacd05f790e2f6863362be0f112b2d6deb58803502500a536b5b6ef24b90b8d30732acb4f3f635c69d1ea38282d900d7422cf7b6f1c6e4d174

  • SSDEEP

    24576:Pgdy5yNM4444444444444444444444444444444444444444444444444444444g:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      5d1470caf0cf10f682be43586f909f62_JaffaCakes118

    • Size

      14.7MB

    • MD5

      5d1470caf0cf10f682be43586f909f62

    • SHA1

      8b8e686d21ff3277ce86d9b5f9475eff108875ff

    • SHA256

      39177e8c1255444d714f716028f324d346c3f9ce13e99554ef9a56a9094bdf58

    • SHA512

      c265fee6d74bfaaacd05f790e2f6863362be0f112b2d6deb58803502500a536b5b6ef24b90b8d30732acb4f3f635c69d1ea38282d900d7422cf7b6f1c6e4d174

    • SSDEEP

      24576:Pgdy5yNM4444444444444444444444444444444444444444444444444444444g:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks