General

  • Target

    8bcc5ece70e5340c66d2e97415ffb075_JaffaCakes118

  • Size

    13.5MB

  • Sample

    241103-q52k1swekk

  • MD5

    8bcc5ece70e5340c66d2e97415ffb075

  • SHA1

    88c81af6078c36e4df87306a6dbb94e2f7158d44

  • SHA256

    f1487d97f490f7b6e072b9f097322b02ef8702b15872bce83382ee2b164d702f

  • SHA512

    9eceb1bd7a9ebbd5ed929a3e752280be6b9df30fa1ffedde0eb564b105eedb9e2c750a6b0cf703b45e3d529906eaa6ef748ce32d749f4de68b30bfe04ac22048

  • SSDEEP

    393216:D88888888888888888888888888888888888888888888888888888888888888n:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      8bcc5ece70e5340c66d2e97415ffb075_JaffaCakes118

    • Size

      13.5MB

    • MD5

      8bcc5ece70e5340c66d2e97415ffb075

    • SHA1

      88c81af6078c36e4df87306a6dbb94e2f7158d44

    • SHA256

      f1487d97f490f7b6e072b9f097322b02ef8702b15872bce83382ee2b164d702f

    • SHA512

      9eceb1bd7a9ebbd5ed929a3e752280be6b9df30fa1ffedde0eb564b105eedb9e2c750a6b0cf703b45e3d529906eaa6ef748ce32d749f4de68b30bfe04ac22048

    • SSDEEP

      393216:D88888888888888888888888888888888888888888888888888888888888888n:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks