General

  • Target

    d0b0f6e0bbc2b182e836b7d40fa46d0e_JaffaCakes118

  • Size

    11.4MB

  • Sample

    241207-e9wpsawpgs

  • MD5

    d0b0f6e0bbc2b182e836b7d40fa46d0e

  • SHA1

    4832ba6cb5d2f38e729603de44f0c057cd5ec8e0

  • SHA256

    1f4a7eab9284a9e0f2ba200c3c9c113192b6626170cb9713263e5c9f45671644

  • SHA512

    798ab4f216bc335678ab7ebb706303fd1b94529cfc7605c276917fd0fa461754cc211fdcf9d9f0c917a125f2d7891d94e93c26c97cc90e861fb61cc11004cad5

  • SSDEEP

    12288:uUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555H:ul+PrmrXrd1p

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d0b0f6e0bbc2b182e836b7d40fa46d0e_JaffaCakes118

    • Size

      11.4MB

    • MD5

      d0b0f6e0bbc2b182e836b7d40fa46d0e

    • SHA1

      4832ba6cb5d2f38e729603de44f0c057cd5ec8e0

    • SHA256

      1f4a7eab9284a9e0f2ba200c3c9c113192b6626170cb9713263e5c9f45671644

    • SHA512

      798ab4f216bc335678ab7ebb706303fd1b94529cfc7605c276917fd0fa461754cc211fdcf9d9f0c917a125f2d7891d94e93c26c97cc90e861fb61cc11004cad5

    • SSDEEP

      12288:uUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555H:ul+PrmrXrd1p

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks