General

  • Target

    cdef13e7d06a949ff9ef11a34d0c71d1_JaffaCakes118

  • Size

    12.8MB

  • Sample

    241206-ts2a9s1rgn

  • MD5

    cdef13e7d06a949ff9ef11a34d0c71d1

  • SHA1

    3c175b6542ce46e65586e893075e544e76f09119

  • SHA256

    e2bccbe745e4aeb17af9be5311326fca14bce9ae8c1f25c01d514393e1f7cf37

  • SHA512

    f5bbd2985a9d7f0cdd40bc67c6b5f9a86bb70bc6c9ee49a679161deeb761b64aa8fd0c8e01da8b4da4a207737ea796c676fc75fdd8940cdaa84b9858d7abd0d2

  • SSDEEP

    49152:DT81MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMv:DT8

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      cdef13e7d06a949ff9ef11a34d0c71d1_JaffaCakes118

    • Size

      12.8MB

    • MD5

      cdef13e7d06a949ff9ef11a34d0c71d1

    • SHA1

      3c175b6542ce46e65586e893075e544e76f09119

    • SHA256

      e2bccbe745e4aeb17af9be5311326fca14bce9ae8c1f25c01d514393e1f7cf37

    • SHA512

      f5bbd2985a9d7f0cdd40bc67c6b5f9a86bb70bc6c9ee49a679161deeb761b64aa8fd0c8e01da8b4da4a207737ea796c676fc75fdd8940cdaa84b9858d7abd0d2

    • SSDEEP

      49152:DT81MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMv:DT8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks