General

  • Target

    73b1634dc98c999fcd121a91da52a8d2_JaffaCakes118

  • Size

    10.2MB

  • Sample

    241024-pf37wa1cnn

  • MD5

    73b1634dc98c999fcd121a91da52a8d2

  • SHA1

    f487ece096743fa576405d3c2065ca9ab5731b10

  • SHA256

    1e095e77c4778eac5f99d6fde091616ce804837eaed6267befeae9e54118c3b3

  • SHA512

    306daf06368005febb95e2f38d670a4643be7a08287a9c518208bc6d85eb7608d990db7440bff9d7a1587b09977a7d2210b79dc26a06a09821f8fb5bfee80ef8

  • SSDEEP

    12288:cj8IJUh3rNPQTN2/bMBrow6NGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGr:cDJqrFb0on

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      73b1634dc98c999fcd121a91da52a8d2_JaffaCakes118

    • Size

      10.2MB

    • MD5

      73b1634dc98c999fcd121a91da52a8d2

    • SHA1

      f487ece096743fa576405d3c2065ca9ab5731b10

    • SHA256

      1e095e77c4778eac5f99d6fde091616ce804837eaed6267befeae9e54118c3b3

    • SHA512

      306daf06368005febb95e2f38d670a4643be7a08287a9c518208bc6d85eb7608d990db7440bff9d7a1587b09977a7d2210b79dc26a06a09821f8fb5bfee80ef8

    • SSDEEP

      12288:cj8IJUh3rNPQTN2/bMBrow6NGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGr:cDJqrFb0on

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks