General

  • Target

    a7b5afb958e1f5a5aa8a89fcffd4e2bb_JaffaCakes118

  • Size

    11.0MB

  • Sample

    241127-ny3hmaslax

  • MD5

    a7b5afb958e1f5a5aa8a89fcffd4e2bb

  • SHA1

    a581eaa933ebd023e48f9633257a1099e0085bdf

  • SHA256

    8dada8550c69139e50dcdf23aac63902b63fc35e4092ad10aa125dad7833b245

  • SHA512

    a20f40a6c1794eb4736956ecc62d69ff279aad472f229147b983f666c21a84ff9561e4b790b221d9a80a0dfc586d11a767ad68e68cff3305d346ec0da5a8d64d

  • SSDEEP

    196608:SkNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNd:S

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      a7b5afb958e1f5a5aa8a89fcffd4e2bb_JaffaCakes118

    • Size

      11.0MB

    • MD5

      a7b5afb958e1f5a5aa8a89fcffd4e2bb

    • SHA1

      a581eaa933ebd023e48f9633257a1099e0085bdf

    • SHA256

      8dada8550c69139e50dcdf23aac63902b63fc35e4092ad10aa125dad7833b245

    • SHA512

      a20f40a6c1794eb4736956ecc62d69ff279aad472f229147b983f666c21a84ff9561e4b790b221d9a80a0dfc586d11a767ad68e68cff3305d346ec0da5a8d64d

    • SSDEEP

      196608:SkNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNd:S

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks