General
-
Target
7b1eec8067b553c98eea1f8526b90669_JaffaCakes118
-
Size
61KB
-
Sample
241028-3rva1axqhs
-
MD5
7b1eec8067b553c98eea1f8526b90669
-
SHA1
fe5f38cf34cc91e2d4c2fc07a0d9247c6f596bc5
-
SHA256
fc9f3d976100c2cb339c25ec6ff62227f482a97dad0056a0ddc5b52491e98a82
-
SHA512
c031921ffea5dfa0210650c633996e6e07ef088d2c41f83a119ae5fcaff9e7a639320e8e4cd2050042835186f3c12fe321be3fbfcc30f6af05d0b60373c9120b
-
SSDEEP
1536:U17SrsJ9yZDZF784R8qXocXlEXSdwocy/XEWfm/syjG9CpipuIpcNU:U1ersXyR868cXWeciXEWfd59CIpdph
Static task
static1
Behavioral task
behavioral1
Sample
7777.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7777.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
msdlm32.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msdlm32.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
185.4.227.76
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Targets
-
-
Target
7777.bat
-
Size
184B
-
MD5
0a189696791314d2c06e9845ce37322c
-
SHA1
2e904862da7a484b399be314269913f878fd856c
-
SHA256
bdf4e2f639a995cac116e129771fe1b77f2b86d4b243b76da12824607520e557
-
SHA512
f89e087e87406fcb1d4577fd72697526f4ded5573c09f17400b0b55cc23db50fe8df2009a767ea9cc628181dd044d1033d66d0ca0ab764acd9d79c323fc2fdb4
Score7/10-
Deletes itself
-
-
-
Target
msdlm32.exe
-
Size
83KB
-
MD5
4020fbcc7c19e735fafa725bcd3ea2c5
-
SHA1
bec43452d9f0d61192bc3851b012cef31882ca02
-
SHA256
85619645a77454990bb4e730dc87ccd630a4e01f04a10595278ac5c115effac9
-
SHA512
7bd6570d5bc4edfdc7e8cf2880707a84ac3d61f83090b529305520d0871181f060d539c587ffb981180de84d448cebc9e0e3cc1c96cda920f69d9952ccd1622c
-
SSDEEP
1536:P2EsPRwdL8AlXUBWCDTsG0QGcn4Z6v/Ea6oVaodgyl744BDK:OMNlfGd0QGbZgEaTVVdgylM4BDK
Score10/10-
Tofsee family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-