General

  • Target

    adbd70490450994bf9c1055a86213eaa_JaffaCakes118

  • Size

    11.5MB

  • Sample

    241128-16bq4aykfm

  • MD5

    adbd70490450994bf9c1055a86213eaa

  • SHA1

    232eb1058e2bca78dc7fddd7218329b4a5e7638c

  • SHA256

    740fe2c8e4dd0b8d589b35781d97b36d73e919742553910eab419f314bbd2650

  • SHA512

    107e9c49de8eddb0681d81b9bedd82aa79e3a940e7929a40aa6473d7225fcaeaf48e82f9bcff50c3d95adb6d6d9216a17d7274f49bbf7d708e932cbcb8221526

  • SSDEEP

    12288:TvSzTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTt:2z

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      adbd70490450994bf9c1055a86213eaa_JaffaCakes118

    • Size

      11.5MB

    • MD5

      adbd70490450994bf9c1055a86213eaa

    • SHA1

      232eb1058e2bca78dc7fddd7218329b4a5e7638c

    • SHA256

      740fe2c8e4dd0b8d589b35781d97b36d73e919742553910eab419f314bbd2650

    • SHA512

      107e9c49de8eddb0681d81b9bedd82aa79e3a940e7929a40aa6473d7225fcaeaf48e82f9bcff50c3d95adb6d6d9216a17d7274f49bbf7d708e932cbcb8221526

    • SSDEEP

      12288:TvSzTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTpTt:2z

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks