General

  • Target

    8f3c0b728b9123ddec273a9578aee70f_JaffaCakes118

  • Size

    10.8MB

  • Sample

    241104-ffsayawren

  • MD5

    8f3c0b728b9123ddec273a9578aee70f

  • SHA1

    33dd24ff4dd00f287a8a17f4eb6914732ce6dbbe

  • SHA256

    f8bd0553de1b1294e0479422afa9dfaf07838fa1aede326e71610e35b2de7ce4

  • SHA512

    769272b5a61f121c63b3beb2c468be0571665906adc870966a13a530daf7ab30ca0dd4947b1164c56ca30e89154788093f2720382c1c2cd48f786fd70087a168

  • SSDEEP

    24576:Qd6E8xWmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmG:e6b

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      8f3c0b728b9123ddec273a9578aee70f_JaffaCakes118

    • Size

      10.8MB

    • MD5

      8f3c0b728b9123ddec273a9578aee70f

    • SHA1

      33dd24ff4dd00f287a8a17f4eb6914732ce6dbbe

    • SHA256

      f8bd0553de1b1294e0479422afa9dfaf07838fa1aede326e71610e35b2de7ce4

    • SHA512

      769272b5a61f121c63b3beb2c468be0571665906adc870966a13a530daf7ab30ca0dd4947b1164c56ca30e89154788093f2720382c1c2cd48f786fd70087a168

    • SSDEEP

      24576:Qd6E8xWmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmG:e6b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks